Sunday, November 9, 2025

 

DIGITAL LIFE


Landfall spyware targeted Samsung phone flaw, attackers still unknown

Samsung Galaxy phones have been targeted by Android spyware dubbed Landfall, and for nearly a year, the attack went unpatched, running rampant throughout the Middle East. Unit 42 has recently released an in-depth report on the spyware and how it works, showcasing how a weakness in Samsung's image processing library allowed for Landfall to execute arbitrary code on victims' devices. Unit 42's findings indicate that the attack was not deployed on the larger Internet like Herodotus, but rather toward specific individuals in the Middle East, and exact motivations or identities of the attackers in question remain unknown.

Thankfully, the CVE-2025-21042 vulnerability that provided the attack vector for this spyware has been patched by Samsung since April 2025. But this was only after the attack was already in use since at least mid-2024, and Unit 42's research indicated that the attack was used for comprehensive surveillance of compromised devices in the Middle East. Surveillance functions included "microphone recording, location tracking, and collection of photos, contacts, and call logs". The malformed image files used to carry the attack were sent to victims via WhatsApp and subsequently burrowed deep into the system, remaining active and undetected for months until Samsung's patch for the underlying vulnerability was released.

content landfallspyware

So, fortunately for current Samsung and Android users, there's no immediate cause for concern. As long as you've patched your Android phone since April 2025, you're most likely safe from this specific attack and the vulnerability it exploited. However, it does show a concerning trend in zero-click attacks on Android devices that don't even require users to download an application or misclick on a web page, which makes careful curation of browsing destinations and contacts even more important for those trying to protect their privacy.  Many new pieces of malware no longer require user ignorance to exploit—now, just being the recipient of an innocuous image file on an unpatched device could be a precursor to a malware infection.

The full Unit 42 report is available on Palo Alto Networks' blog, and goes into far more details on the specifics of this attack and how it and its contemporaries do their work. Knowledge of attacks like these emphasize the importance of security updates and up-to-date knowledge of cybersecurity, but especially for government or private sector employees dealing with highly-sensitive information.

mundophone

No comments:

Post a Comment

DIGITAL LIFE China removes major gay dating apps from digital stores in new offensive against LGBTQ+ platforms The gay dating apps Blued and...