Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Nike Knowledge Breach Claims Floor as WorldLeaks Leaks 1.4TB of Recordsdata On-line – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

    January 26, 2026

    The primary massive Home windows replace of 2026 is a glitchy mess – this is the total listing of bugs and fixes

    January 26, 2026

    How CLICKFORCE accelerates data-driven promoting with Amazon Bedrock Brokers

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Samsung Zero-Click on Flaw Exploited to Deploy LANDFALL Android Spyware and adware through WhatsApp
    AI Ethics & Regulation

    Samsung Zero-Click on Flaw Exploited to Deploy LANDFALL Android Spyware and adware through WhatsApp

    Declan MurphyBy Declan MurphyNovember 8, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Samsung Zero-Click on Flaw Exploited to Deploy LANDFALL Android Spyware and adware through WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Nov 07, 2025Ravie LakshmananCellular Safety / Vulnerability

    A now-patched safety flaw in Samsung Galaxy Android units was exploited as a zero-day to ship a “commercial-grade” Android spy ware dubbed LANDFALL in focused assaults within the Center East.

    The exercise concerned the exploitation of CVE-2025-21042 (CVSS rating: 8.8), an out-of-bounds write flaw within the “libimagecodec.quram.so” element that would permit distant attackers to execute arbitrary code, in line with Palo Alto Networks Unit 42. The problem was addressed by Samsung in April 2025.

    “This vulnerability was actively exploited within the wild earlier than Samsung patched it in April 2025, following stories of in-the-wild assaults,” Unit 42 stated. Potential targets of the exercise, tracked as CL-UNK-1054, are situated in Iraq, Iran, Turkey, and Morocco based mostly on VirusTotal submission information.

    The event comes as Samsung disclosed in September 2025 that one other flaw in the identical library (CVE-2025-21043, CVSS rating: 8.8) had additionally been exploited within the wild as a zero-day. There isn’t a proof of this safety flaw being weaponized within the LANDFALL marketing campaign.

    DFIR Retainer Services

    It is assessed that the assaults concerned sending through WhatsApp malicious pictures within the type of DNG (Digital Destructive) information, with proof of LANDFALL samples going all the best way again to July 23, 2024. That is based mostly on DNG artifacts bearing names like “WhatsApp Picture 2025-02-10 at 4.54.17 PM.jpeg” and “IMG-20240723-WA0000.jpg.”

    LANDFALL, as soon as put in and executed, acts as a complete spy device, able to harvesting delicate information, together with microphone recording, location, pictures, contacts, SMS, information, and name logs. The exploit chain is claimed to have possible concerned the usage of a zero-click method to set off exploitation of CVE-2025-21042 with out requiring any consumer interplay.

    Flowchart for LANDFALL spy ware

    It is price noting that across the similar time WhatsApp disclosed {that a} flaw in its messaging app for iOS and macOS (CVE-2025-55177, CVSS rating: 5.4) was chained together with CVE-2025-43300 (CVSS rating: 8.8), a flaw in Apple iOS, iPadOS, and macOS, to doubtlessly goal lower than 200 customers as a part of a complicated marketing campaign. Apple and WhatsApp have since patched the issues.

    Timeline for current malicious DNG picture information and related exploit exercise

    Unit 42’s evaluation of the found DNG information present that they arrive with an embedded ZIP file appended to the top of the file, with the exploit getting used to extract a shared object library from the archive to run the spy ware. Additionally current within the archive is one other shared object that is designed to govern the system’s SELinux coverage to grant LANDFALL elevated permissions and facilitate persistence.

    CIS Build Kits

    The shared object that masses LANDFALL additionally communicates with a command-and-control (C2) server over HTTPS to enter right into a beaconing loop and obtain unspecified next-stage payloads for subsequent execution.

    It is presently not recognized who’s behind the spy ware or the marketing campaign. That stated, Unit 42 stated LANDFALL’s C2 infrastructure and area registration patterns dovetail with that of Stealth Falcon (aka FruityArmor), though, as of October 2025, no direct overlaps between the 2 clusters have been detected.

    “From the preliminary look of samples in July 2024, this exercise highlights how subtle exploits can stay in public repositories for an prolonged interval earlier than being totally understood,” Unit 42 stated.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Nike Knowledge Breach Claims Floor as WorldLeaks Leaks 1.4TB of Recordsdata On-line – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

    January 26, 2026

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Nike Knowledge Breach Claims Floor as WorldLeaks Leaks 1.4TB of Recordsdata On-line – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

    By Declan MurphyJanuary 26, 2026

    As customers proceed to evaluate the Beneath Armour knowledge breach, WorldLeaks, the rebranded model of…

    The primary massive Home windows replace of 2026 is a glitchy mess – this is the total listing of bugs and fixes

    January 26, 2026

    How CLICKFORCE accelerates data-driven promoting with Amazon Bedrock Brokers

    January 26, 2026

    FORT Robotics Launches Wi-fi E-Cease Professional: Actual-Time Wi-fi Security for Advanced Industrial Environments

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.