Your Followed Topics

2.2K est. views14.29%

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp Open in Thehackernews.com
Highlights
  • A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April.
  • The surveillance campaign began in July 2024 and abused CVE-2025-21042, a critical bug in Samsung's image-processing library, enabling DNG-based exploitation across multiple Android versions.
  • The campaign targeted Middle East devices, with victims in Iraq, Iran, Turkey, and Morocco, showing a highly targeted espionage operation aimed at specific Samsung Galaxy devices in the region.

Virality Score Timeline

Vote 5
0

References

'Landfall' spyware abused zero-day to hack Samsung Galaxy phones | TechCrunch

'Landfall' spyware abused zero-day to hack Samsung Galaxy phones | TechCrunch

Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year

Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year

LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices

LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices

Landfall spyware used in 0-day attacks on Samsung phones

Landfall spyware used in 0-day attacks on Samsung phones

Related Topics

0 Comments

Be the first to comment

Add your thoughts and get the conversation going.

Top 809 Internet News Today

Explore Your Interests

Create an account and enjoy content that interests you with your personalized feed

Unlimited Access
Personalized Feed
Full Experience
By continuing, you agree to the Privacy Policy.. You also agree to receive our newsletters, you can opt-out any time.

Advertisement

Advertisement