Cryptopolitan
2025-11-10 12:43:36

Spyware campaign targeting Samsung Galaxy devices via WhatsApp uncovered

Cybersecurity firm Unit 42 has discovered a spyware campaign on Samsung Galaxy devices exploiting a zero-day vulnerability to infiltrate phones through images sent via WhatsApp. Security researchers warn that the operation has been active since mid-2024, and it helps attackers deploy advanced Android malware capable of full device surveillance without user interaction. The operation has been coined by the cybersecurity researchers as LANDFALL, detected in September after an investigation that began probing iOS exploit samples in mid-2025. LANDFALL malware strikes Android Samsung devices According to Unit 42’s investigative report published on November 7, the Android-specific malware was present within the iOS samples hidden in Digital Negative (DNG) image files. Some Samsung Galaxy phone owners reported seeing WhatsApp-style names like “IMG-20240723-WA0000.jpg,” which were uploaded to VirusTotal from locations including Morocco, Iran, Iraq, and Turkey between July 2024 and early 2025. LANDFALL uses a type of exploit called “CVE-2025-21042,” a flaw in Samsung’s image processing library libimagecodec.quram.so . CVE-2025-12725 is also an out-of-bounds write error in WebGPU, which is Google-made browser Chrome’s graphics processing component. The vulnerability was patched in April 2025 following reports of active exploitation, but not before it had malformed DNG files containing an appended ZIP archive on several devices. Unit 42 explained that it tricks the vulnerable library into extracting and executing shared object (.so) libraries that installed the spyware on devices. Unit 42’s report said the spyware activates microphones for recording, tracks users via GPS, and subtly steals information like photos, contacts, call logs, and messages. Samsung Galaxy models that were affected include the S22, S23, S24, and Z series, specifically those with Android versions 13,14 and 15. The zero-day flaw is also affecting DNG image parsing on Apple iOS , where WhatsApp devs discovered attackers were chaining the Apple vulnerability with the flaw to force devices to process content from malicious URLs. The second part of LANDFALL, called b.so, connects to its command-and-control (C2) server using HTTPS over a temporary TCP port that is not standard. The malware can send ping signals to check if the server is up and running before starting encrypted traffic. This is explained in the technical appendix of the report. Once the HTTPS connection is active, b.so transmits a POST request containing detailed information about the infected device and spyware instance, including the agent ID, device path, and user ID. In September, WhatsApp reported a related vulnerability (CVE-2025-21043) to Samsung. The messaging company advised users that a malicious message could exploit flaws in the operating system to compromise devices and the data they contain. “Our investigation indicates that a malicious message may have been sent to you through WhatsApp and combined with other vulnerabilities in your device’s operating system,” Meta said in a security update. “While we don’t know with certainty that your device has been compromised, we wanted to let you know out of an abundance of caution.” Last week, news publication The Peninsula reported that the campaign could be traced back to state-linked spyware on mobile devices in the Middle East. NSO Group’s Pegasus, Cytox/Intellexa’s Predator, and Gamma’s FinFisher FinSpy have long been associated with similar attacks. Google provides updates to counter zero-day security flaw According to a previous Google report, these actors were responsible for nearly half of all zero-day vulnerabilities in its products between 2014 and 2023. Last month, a US federal court barred Israeli NSO Group from reverse engineering WhatsApp to deliver spyware. “Part of what companies such as WhatsApp are ‘selling’ is informational privacy, and any unauthorised access is an interference with that sale,” US District Judge Phyllis Hamilton said in her ruling. The technology giants released Chrome version 142 last week to counter five critical security vulnerabilities, three of which it said had “high-risk severity” ratings. The update was made available on desktop platforms and Android devices through patches launched via Google Play. CVE-2025-12727 affects Chrome’s JavaScript engine V8, which is responsible for performance execution, while CVE-2025-12726 impacts the browser’s user interface manager Chrome Views. Cybersecurity professionals are now asking Samsung Galaxy users to immediately apply the April 2025 security update to patch CVE-2025-21042. Claim your free seat in an exclusive crypto trading community - limited to 1,000 members.

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.