NG Solution Team
Technology

How Does the New “LANDFALL” Malware Exploit Samsung Vulnerabilities Through WhatsApp Images?

Cybersecurity experts have identified a new Android spyware campaign, named LANDFALL, targeting Samsung Galaxy devices through a critical vulnerability. This malware exploits a zero-day flaw in Samsung’s image processing library, delivering surveillance capabilities via specially crafted image files sent through WhatsApp. The vulnerability, CVE-2025-21042, was unpatched until April 2025, allowing the spyware to embed itself in DNG image files delivered to targets. This method is similar to attacks on Apple iOS devices, indicating a trend of exploiting DNG vulnerabilities across platforms. LANDFALL is designed to infiltrate Samsung devices like the S22, S23, and S24 series, as well as Z Fold4 and Z Flip4 models. The malware’s components communicate with a command and control server, enabling extensive surveillance functions such as recording, tracking, and data extraction. The campaign has been linked to targeted attacks in the Middle East, with potential connections to known spyware groups. Samsung addressed this vulnerability in April 2025, and additional related vulnerabilities were patched in September 2025, protecting users from similar threats.

Related posts

Is Apple’s iPhone 17 Dominating the Chinese Market in October?

David Jones

Why might Galaxy S23 users miss out on a key AI feature with One UI 8?

David Jones

Are Samsung’s memory profits soaring even higher?

James Smith

Leave a Comment

This website uses cookies to improve your experience. We assume you agree, but you can opt out if you wish. Accept More Info

Privacy & Cookies Policy