The post Spyware campaign targeting Samsung Galaxy devices via WhatsApp uncovered appeared on BitcoinEthereumNews.com. Cybersecurity firm Unit 42 has discovered a spyware campaign on Samsung Galaxy devices exploiting a zero-day vulnerability to infiltrate phones through images sent via WhatsApp.  Security researchers warn that the operation has been active since mid-2024, and it helps attackers deploy advanced Android malware capable of full device surveillance without user interaction. The operation has been coined by the cybersecurity researchers as LANDFALL, detected in September after an investigation that began probing iOS exploit samples in mid-2025.  LANDFALL malware strikes Android Samsung devices According to Unit 42’s investigative report published on November 7, the Android-specific malware was present within the iOS samples hidden in Digital Negative (DNG) image files.  Some Samsung Galaxy phone owners reported seeing WhatsApp-style names like “IMG-20240723-WA0000.jpg,” which were uploaded to VirusTotal from locations including Morocco, Iran, Iraq, and Turkey between July 2024 and early 2025. LANDFALL uses a type of exploit called “CVE-2025-21042,” a flaw in Samsung’s image processing library libimagecodec.quram.so. CVE-2025-12725 is also an out-of-bounds write error in WebGPU, which is Google-made browser Chrome’s graphics processing component.  The vulnerability was patched in April 2025 following reports of active exploitation, but not before it had malformed DNG files containing an appended ZIP archive on several devices. Unit 42 explained that it tricks the vulnerable library into extracting and executing shared object (.so) libraries that installed the spyware on devices.  Unit 42’s report said the spyware activates microphones for recording, tracks users via GPS, and subtly steals information like photos, contacts, call logs, and messages. Samsung Galaxy models that were affected include the S22, S23, S24, and Z series, specifically those with Android versions 13,14 and 15.  The zero-day flaw is also affecting DNG image parsing on Apple iOS, where WhatsApp devs discovered attackers were chaining the Apple vulnerability with the flaw to force devices to process… The post Spyware campaign targeting Samsung Galaxy devices via WhatsApp uncovered appeared on BitcoinEthereumNews.com. Cybersecurity firm Unit 42 has discovered a spyware campaign on Samsung Galaxy devices exploiting a zero-day vulnerability to infiltrate phones through images sent via WhatsApp.  Security researchers warn that the operation has been active since mid-2024, and it helps attackers deploy advanced Android malware capable of full device surveillance without user interaction. The operation has been coined by the cybersecurity researchers as LANDFALL, detected in September after an investigation that began probing iOS exploit samples in mid-2025.  LANDFALL malware strikes Android Samsung devices According to Unit 42’s investigative report published on November 7, the Android-specific malware was present within the iOS samples hidden in Digital Negative (DNG) image files.  Some Samsung Galaxy phone owners reported seeing WhatsApp-style names like “IMG-20240723-WA0000.jpg,” which were uploaded to VirusTotal from locations including Morocco, Iran, Iraq, and Turkey between July 2024 and early 2025. LANDFALL uses a type of exploit called “CVE-2025-21042,” a flaw in Samsung’s image processing library libimagecodec.quram.so. CVE-2025-12725 is also an out-of-bounds write error in WebGPU, which is Google-made browser Chrome’s graphics processing component.  The vulnerability was patched in April 2025 following reports of active exploitation, but not before it had malformed DNG files containing an appended ZIP archive on several devices. Unit 42 explained that it tricks the vulnerable library into extracting and executing shared object (.so) libraries that installed the spyware on devices.  Unit 42’s report said the spyware activates microphones for recording, tracks users via GPS, and subtly steals information like photos, contacts, call logs, and messages. Samsung Galaxy models that were affected include the S22, S23, S24, and Z series, specifically those with Android versions 13,14 and 15.  The zero-day flaw is also affecting DNG image parsing on Apple iOS, where WhatsApp devs discovered attackers were chaining the Apple vulnerability with the flaw to force devices to process…

Spyware campaign targeting Samsung Galaxy devices via WhatsApp uncovered

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Cybersecurity firm Unit 42 has discovered a spyware campaign on Samsung Galaxy devices exploiting a zero-day vulnerability to infiltrate phones through images sent via WhatsApp. 

Security researchers warn that the operation has been active since mid-2024, and it helps attackers deploy advanced Android malware capable of full device surveillance without user interaction.

The operation has been coined by the cybersecurity researchers as LANDFALL, detected in September after an investigation that began probing iOS exploit samples in mid-2025. 

LANDFALL malware strikes Android Samsung devices

According to Unit 42’s investigative report published on November 7, the Android-specific malware was present within the iOS samples hidden in Digital Negative (DNG) image files. 

Some Samsung Galaxy phone owners reported seeing WhatsApp-style names like “IMG-20240723-WA0000.jpg,” which were uploaded to VirusTotal from locations including Morocco, Iran, Iraq, and Turkey between July 2024 and early 2025.

LANDFALL uses a type of exploit called “CVE-2025-21042,” a flaw in Samsung’s image processing library libimagecodec.quram.so. CVE-2025-12725 is also an out-of-bounds write error in WebGPU, which is Google-made browser Chrome’s graphics processing component. 

The vulnerability was patched in April 2025 following reports of active exploitation, but not before it had malformed DNG files containing an appended ZIP archive on several devices. Unit 42 explained that it tricks the vulnerable library into extracting and executing shared object (.so) libraries that installed the spyware on devices. 

Unit 42’s report said the spyware activates microphones for recording, tracks users via GPS, and subtly steals information like photos, contacts, call logs, and messages. Samsung Galaxy models that were affected include the S22, S23, S24, and Z series, specifically those with Android versions 13,14 and 15. 

The zero-day flaw is also affecting DNG image parsing on Apple iOS, where WhatsApp devs discovered attackers were chaining the Apple vulnerability with the flaw to force devices to process content from malicious URLs.

The second part of LANDFALL, called b.so, connects to its command-and-control (C2) server using HTTPS over a temporary TCP port that is not standard. The malware can send ping signals to check if the server is up and running before starting encrypted traffic. This is explained in the technical appendix of the report.

Once the HTTPS connection is active, b.so transmits a POST request containing detailed information about the infected device and spyware instance, including the agent ID, device path, and user ID.

In September, WhatsApp reported a related vulnerability (CVE-2025-21043) to Samsung. The messaging company advised users that a malicious message could exploit flaws in the operating system to compromise devices and the data they contain. 

“Our investigation indicates that a malicious message may have been sent to you through WhatsApp and combined with other vulnerabilities in your device’s operating system,” Meta said in a security update. “While we don’t know with certainty that your device has been compromised, we wanted to let you know out of an abundance of caution.”

Last week, news publication The Peninsula reported that the campaign could be traced back to state-linked spyware on mobile devices in the Middle East. NSO Group’s Pegasus, Cytox/Intellexa’s Predator, and Gamma’s FinFisher FinSpy have long been associated with similar attacks. 

Google provides updates to counter zero-day security flaw

According to a previous Google report, these actors were responsible for nearly half of all zero-day vulnerabilities in its products between 2014 and 2023. Last month, a US federal court barred Israeli NSO Group from reverse engineering WhatsApp to deliver spyware.

“Part of what companies such as WhatsApp are ‘selling’ is informational privacy, and any unauthorised access is an interference with that sale,” US District Judge Phyllis Hamilton said in her ruling.

The technology giants released Chrome version 142 last week to counter five critical security vulnerabilities, three of which it said had “high-risk severity” ratings. The update was made available on desktop platforms and Android devices through patches launched via Google Play.

CVE-2025-12727 affects Chrome’s JavaScript engine V8, which is responsible for performance execution, while CVE-2025-12726 impacts the browser’s user interface manager Chrome Views. 

Cybersecurity professionals are now asking Samsung Galaxy users to immediately apply the April 2025 security update to patch CVE-2025-21042. 

Claim your free seat in an exclusive crypto trading community – limited to 1,000 members.

Source: https://www.cryptopolitan.com/hackers-hijack-samsung-galaxy-phones/

Market Opportunity
Octavia Logo
Octavia Price(VIA)
$0.0024669
$0.0024669$0.0024669
0.00%
USD
Octavia (VIA) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

iCapital® Acquires Hexure to Create the Industry’s First End-to-End Annuity and Insurance Technology Platform

iCapital® Acquires Hexure to Create the Industry’s First End-to-End Annuity and Insurance Technology Platform

The acquisition empowers financial advisors, distributors, and insurance carriers with a single integrated platform iCapital1, the global fintech company shaping
Share
Globalfintechseries2026/03/17 22:02
ADA Price Prediction: Here’s The Best Place To Make 50x Gains

ADA Price Prediction: Here’s The Best Place To Make 50x Gains

But while Cardano holds steady, Remittix is turning into the breakout story of 2025. Having raised over $25.9 million from […] The post ADA Price Prediction: Here’s The Best Place To Make 50x Gains appeared first on Coindoo.
Share
Coindoo2025/09/18 01:53
Fed forecasts only one rate cut in 2026, a more conservative outlook than expected

Fed forecasts only one rate cut in 2026, a more conservative outlook than expected

The post Fed forecasts only one rate cut in 2026, a more conservative outlook than expected appeared on BitcoinEthereumNews.com. Federal Reserve Chairman Jerome Powell talks to reporters following the regular Federal Open Market Committee meetings at the Fed on July 30, 2025 in Washington, DC. Chip Somodevilla | Getty Images The Federal Reserve is projecting only one rate cut in 2026, fewer than expected, according to its median projection. The central bank’s so-called dot plot, which shows 19 individual members’ expectations anonymously, indicated a median estimate of 3.4% for the federal funds rate at the end of 2026. That compares to a median estimate of 3.6% for the end of this year following two expected cuts on top of Wednesday’s reduction. A single quarter-point reduction next year is significantly more conservative than current market pricing. Traders are currently pricing in at two to three more rate cuts next year, according to the CME Group’s FedWatch tool, updated shortly after the decision. The gauge uses prices on 30-day fed funds futures contracts to determine market-implied odds for rate moves. Here are the Fed’s latest targets from 19 FOMC members, both voters and nonvoters: Zoom In IconArrows pointing outwards The forecasts, however, showed a large difference of opinion with two voting members seeing as many as four cuts. Three officials penciled in three rate reductions next year. “Next year’s dot plot is a mosaic of different perspectives and is an accurate reflection of a confusing economic outlook, muddied by labor supply shifts, data measurement concerns, and government policy upheaval and uncertainty,” said Seema Shah, chief global strategist at Principal Asset Management. The central bank has two policy meetings left for the year, one in October and one in December. Economic projections from the Fed saw slightly faster economic growth in 2026 than was projected in June, while the outlook for inflation was updated modestly higher for next year. There’s a lot of uncertainty…
Share
BitcoinEthereumNews2025/09/18 02:59