{"id":370676,"date":"2025-11-11T03:45:20","date_gmt":"2025-11-11T03:45:20","guid":{"rendered":"https:\/\/www.europesays.com\/us\/370676\/"},"modified":"2025-11-11T03:45:20","modified_gmt":"2025-11-11T03:45:20","slug":"cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/370676\/","title":{"rendered":"CISA orders feds to patch Samsung zero-day used in spyware attacks"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"CISA\" height=\"900\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/CISA--headpic.jpg\" width=\"1600\"\/><\/p>\n<p>CISA ordered U.S. federal agencies today to patch a critical Samsung vulnerability that has been exploited in zero-day attacks to deploy LandFall spyware on devices running WhatsApp.<\/p>\n<p>Tracked as\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21042\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-21042<\/a>, this\u00a0out-of-bounds write\u00a0security flaw was discovered in Samsung&#8217;s libimagecodec.quram.so library, allowing remote attackers to gain code execution on\u00a0devices running Android 13 and later.<\/p>\n<p>While Samsung <a href=\"http:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&amp;month=04\" target=\"_blank\" rel=\"nofollow noopener\">patched it in April<\/a> following a report from Meta and WhatsApp Security Teams,\u00a0Palo Alto Networks&#8217; Unit 42 revealed last week that attackers had\u00a0been exploiting it\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-landfall-spyware-exploited-samsung-zero-day-via-whatsapp-messages\/\" target=\"_blank\" rel=\"nofollow noopener\">since\u00a0at least July 2024<\/a> to deploy\u00a0previously unknown LandFall spyware\u00a0via malicious DNG images sent over WhatsApp.<\/p>\n<p> <a href=\"https:\/\/www.wiz.io\/lp\/ai-data-security-best-practices-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_Form_AI-Data-Security-Best-Practices&amp;sfcid=701Py00000SmgsrIAB&amp;utm_term=FY26Q4-bleepingcomputer-970x250&amp;utm_content=AI-Data-Security-BP\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/AI-Data-Security-970x250.png\" alt=\"Wiz\" style=\"margin-top: 0px;\"\/><\/a><\/p>\n<p>The spyware is capable of accessing the victim&#8217;s browsing history, recording calls and audio, tracking their location, as well as accessing photos, contacts, SMS, call logs, and files.<\/p>\n<p>According to Unit 42&#8217;s analysis, it targets a wide range of\u00a0Samsung\u00a0flagship models, including\u00a0the Galaxy S22, S23, and S24 series devices, as well as the Z Fold 4 and Z Flip 4.<\/p>\n<p>\u200bData from VirusTotal samples examined by Unit 42 researchers shows potential targets in Iraq, Iran, Turkey, and Morocco, while C2 domain infrastructure and\u00a0registration patterns share similarities with those seen in Stealth Falcon operations, which originated from the United Arab Emirates.<\/p>\n<p>Another clue is the use of the &#8220;Bridge Head&#8221; name for the malware loader component, a naming convention commonly seen in commercial spyware developed by\u00a0NSO Group, Variston, Cytrox, and Quadream.\u00a0However, LandFall could not be confidently linked to any known spyware vendors or\u00a0threat groups.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"CVE-2025-21042 exploitation timeline\" height=\"400\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/dmg.jpg\" width=\"493\"\/>CVE-2025-21042 exploitation timeline (Unit 42)<\/p>\n<p>\u00a0<\/p>\n<p>CISA has now\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/11\/10\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a>\u00a0the CVE-2025-21042 flaw\u00a0to its\u00a0<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-21042\" target=\"_blank\" rel=\"nofollow noopener\">Known Exploited Vulnerabilities catalog<\/a>, which lists security bugs flagged as actively exploited in attacks, ordering\u00a0Federal Civilian Executive Branch (FCEB) agencies to secure their Samsung devices against ongoing attacks within three weeks, until December 1, as mandated by the Binding Operational Directive (BOD) 22-01.<\/p>\n<p>FCEB agencies are non-military agencies within the U.S. executive branch, including the Department of Energy, the Department of the Treasury, the Department of Homeland Security, and the Department of Health and Human Services.<\/p>\n<p>While this binding operational directive\u00a0only applies to federal agencies, CISA has urged all organizations to prioritize patching this security flaw\u00a0as soon as possible.<\/p>\n<p>&#8220;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,&#8221; it warned.<\/p>\n<p>&#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable,&#8221; the cybersecurity agency added.<\/p>\n<p>In September, Samsung released security updates to\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp\/\" target=\"_blank\" rel=\"nofollow noopener\">patch another\u00a0libimagecodec.quram.so flaw<\/a>\u00a0(CVE-2025-21043) that was exploited in zero-day attacks targeting its Android devices.<\/p>\n<p>        <a href=\"https:\/\/www.wiz.io\/lp\/secrets-security-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&amp;sfcid=701Py00000T0tF9IAJ&amp;utm_term=FY26Q4-bleepingcomputer-article-ad&amp;utm_content=Secrets-Security\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" alt=\"Wiz\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/Secrets-Security-512x512.png\" class=\"b-lazy\"\/><\/a><\/p>\n<p>Whether you&#8217;re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.<\/p>\n<p>Get the cheat sheet and take the guesswork out of secrets management.<\/p>\n<p>        <a href=\"https:\/\/www.wiz.io\/lp\/secrets-security-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&amp;sfcid=701Py00000T0tF9IAJ&amp;utm_term=FY26Q4-bleepingcomputer-article-ad&amp;utm_content=Secrets-Security\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Download Now<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"CISA ordered U.S. federal agencies today to patch a critical Samsung vulnerability that has been exploited in zero-day&hellip;\n","protected":false},"author":3,"featured_media":370677,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[158,67,132,68],"class_list":{"0":"post-370676","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-technology","9":"tag-united-states","10":"tag-unitedstates","11":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115529012415279545","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/370676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=370676"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/370676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/370677"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=370676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=370676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=370676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}