Level up your virtual setup with pro gear for casting, interviews, and content creation — be seen, be heard, be unforgettable

These Galaxy phones were attacked by spyware for nearly a year before a patch was released

A zero-day vulnerability (CVE-2025-21042) in Samsung’s Android image processing library allowed attackers to embed spyware called LANDFALL in Samsung devices including Galaxy handsets. Here are some definitions; a zero-day vulnerability is one that no one knows about giving the developer zero days to come up with a way to patch the flaw. Samsung’s Android image processing library handles the decoding and processing of various image formats, including some formats that are proprietary to Samsung.

The LANDFALL spyware impacted certain Samsung phones

The thing is, LANDFALL was exploited in the wild before Samsung was able to patch the vulnerability this past April. However, the exploitation and the spyware employed have never been discussed publicly until this past week. LANDFALL was embedded in malicious DNG image files that were sent via WhatsApp. According to the Palo Alto Network, LANDFALL was operating in the middle of 2024 which was months before the vulnerability was patched.
As for the involvement of WhatsApp delivering the Samsung exploit, this has been denied by WhatsApp owner Meta according to a report from Forbes. Meta says that it has not found any basis to support this aspect of the story and says that there is no evidence to support the claim.

LANDFALL hasn’t been a threat since this past April although another zero-day vulnerability was patched by Samsung just two months ago during September. This flaw (CVE-2025-21043) was also found in the imaging processing library. The patch prevents any attack from taking place.

The spyware used microphone recording, location tracking, and photos for surveillance 

Itay Cohen, a senior principal researcher at Palo Alto Network’s Unit 42 said that the LANDFALL attack was targeted at certain individuals and was not mass-distributed. Cohen says that the motive for these attacks was espionage.

We should point out that the LANDFALL spyware was designed for attacks against the Samsung Galaxy line mostly with targeted attacks taking place primarily in the Middle East including Turkey, Iran, Iraq, and Morocco. Being spyware, it shouldn’t be a surprise that LANDFALL used microphone recording, location tracking, photos, contacts. A malformed image file, one that has been deliberately corrupted to set off a flaw in the software that reads the file, was used in the attacks. No clicks were required to exploit the vulnerability.

As soon as the image was received by the targeted Galaxy phone, the device was compromised. Once these photos were opened or previewed, the phone could be used by attackers to:
  • Record microphone audio and phone calls.
  • In real time, track GPS location.
  • Access photos, messages, contacts, call logs, and browsing history.
  • Hide from antivirus scans and even remain active after reboots.
Reports say that the Samsung phones most attacked by LANDFALL include the Galaxy S22 line. Galaxy S23 line, Galaxy S24 line, Z Fold 4 and Z Flip 4 foldables. The Galaxy S25 series was not targeted by the spyware. 

For 10 months targeted phones were extremely vulnerable

There was a period of 10 months between the time the campaign began in July 2024 and when the flaw was patched in April of this year when the aforementioned Galaxy models were at the peak of their vulnerability. When Samsung patched the vulnerability this past April, the company made no public statement about it.

Security experts recommend that Samsung Galaxy users with a handset powered by Android 13-15 make sure that they installed the April 2025 Android Security update or later just to make sure that they have the exploit patched on their phones. Automatic media downloads for messaging apps like WhatsApp and Telegram should be disabled. They should also enable Android’s Advanced Protection mode or iOS’s Lockdown Mode if they consider themselves to be a high-risk user.

Iconic Phones is now up for pre-order in the US!

Our new coffee table book, Iconic Phones, is a stunning visual tribute to the legends in the world of phones, featuring exclusive high-resolution photography, stories, quotes and fun trivia. Pre-order now and save 15% with code: PARENA15


Pre-order now

Trending Products

- 10% Video Conference Lighting Kit, Ring...
Original price was: $21.99.Current price is: $19.79.

Video Conference Lighting Kit, Ring...

0
Add to compare
- 32% 15W LED Video Light Kit
Original price was: $50.60.Current price is: $34.19.

15W LED Video Light Kit

0
Add to compare
- 25% Desk Ring Light for Zoom Meetings &...
Original price was: $29.25.Current price is: $21.99.

Desk Ring Light for Zoom Meetings &...

0
Add to compare
- 37% SAMHOUSING Ipad Tripod Stand, with ...
Original price was: $28.60.Current price is: $17.99.

SAMHOUSING Ipad Tripod Stand, with ...

0
Add to compare
- 40% LISEN Tablet Stand
Original price was: $44.80.Current price is: $26.99.

LISEN Tablet Stand

0
Add to compare
- 37% LanPavilion iPad Stand, Adjustable ...
Original price was: $47.38.Current price is: $29.99.

LanPavilion iPad Stand, Adjustable ...

0
Add to compare
- 28% DJI Osmo Mobile SE, 3-Axis Phone Gi...
Original price was: $95.91.Current price is: $69.00.

DJI Osmo Mobile SE, 3-Axis Phone Gi...

0
Add to compare
- 33% 2pcs Original Joystick Parts for Zh...
Original price was: $22.49.Current price is: $14.99.

2pcs Original Joystick Parts for Zh...

0
Add to compare
- 35% hohem iSteady M7 Gimbal
Original price was: $416.95.Current price is: $269.00.

hohem iSteady M7 Gimbal

0
Add to compare
- 20% Hohem iSteady M6 Kit Smartphone Gim...
Original price was: $209.00.Current price is: $167.20.

Hohem iSteady M6 Kit Smartphone Gim...

0
Add to compare
.

We will be happy to hear your thoughts

Leave a reply

ICU Must Haves
Logo
Register New Account
Compare items
  • Total (0)
Compare
0
Shopping cart