FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Landfall Spyware Hacked Samsung Galaxy With Zero-Day

Gregory Zuckerman
Last updated: November 7, 2025 12:03 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

Security researchers say a newly discovered Android spyware campaign has garnered some 100,000 victims in more than 196 countries. Telecom equipment was used to create software targeting Samsung Galaxy phones and to tauntingly place photos of Russian President Vladimir V. Putin on infected devices to show the true origins of malware that lasts anywhere from seven hours to 15 days, depending on how quickly its authors choose to uninstall it.

How the Exploit Chain Functioned on Samsung Galaxy Devices

Landfall “took advantage of a zero-day in Samsung’s code that allows handset owners to gain full read and write access to any developer device on startup by simply flashing an image from their custom skin which is specifically tuned for developer purposes,” wrote investigators at Palo Alto Networks’ Unit 42.

Table of Contents
  • How the Exploit Chain Functioned on Samsung Galaxy Devices
  • Targets and geographic clues behind the Landfall spyware campaign
  • What Landfall Could Access on Compromised Galaxy Devices
  • Patch Status and Exposure for CVE-2025-21042 on Galaxy
  • Why This Case Matters for Mobile Zero-Day Spyware Risks
A blue Samsung smartphone, showing both the front and back, against a professional blue gradient background with subtle circular patterns.

The booby-trapped file was apparently delivered via “a particular messaging application,” and in some instances may not have needed the victim to tap on anything for the hijack to work.

It wasn’t known to Samsung when the attacks started, in about July 2024, but was subsequently catalogued under CVE-2025-21042. Samsung addressed the issue in an April 2025 security update, but the broader strokes of the campaign had not been publicly detailed until now.

Unit 42’s analysis suggests the exploit chain impacted Galaxy devices running versions of Android from 13 through 15. Code references within Landfall samples name-checked several Samsung models, such as the Galaxy S22, S23 and S24, as well as multiple variants of its Galaxy Z foldable range—indicating custom testing against high-volume flagships.

Targets and geographic clues behind the Landfall spyware campaign

Attribution remains incomplete, but the telemetry is revealing. Landfall samples were first submitted to VirusTotal in 2024 and early 2025 by users from Morocco, Iran, Iraq, and Turkey, according to Unit 42. Turkey’s purpose-built cyber readiness center, USOM, has also independently categorized one command-and-control IP associated with Landfall as malicious, indicating an aspect of regional targeting.

It’s unclear how many users have been targeted, and researchers have not determined the spyware’s creator. Unit 42 said activity and infrastructure overlap with systems previously tied to surveillance body, the group of hackers known as Stealth Falcon, which independent researchers have connected to operations against journalists and dissidents in the Gulf region spanning years. It’s a remarkable series of overlaps, but inconclusive; who the government customer might be has not been credibly identified.

What Landfall Could Access on Compromised Galaxy Devices

Landfall feels like the product of modern mercenary spyware. Once established, it can rifle through core device information like photos, messages, contacts, and call logs. The tooling includes live surveillance capabilities (e.g., microphone activation, precise geolocation) and communicates with its remote server for command-and-control operations, to fetch instructions or exfiltrate files.

Although many consumer security products would be able to identify the known malware families, zero-day delivery penetration and post-exploitation stealth will allow these implants to run for years. In previous cases, other toolkits like this one have been used to throttle network usage, remove artefacts, and then adapt themselves to patch cycles in order to maintain access. Landfall’s activity seems aligned with those tradecraft patterns.

A diagram illustrating the LANDFALL Android Spyware attack flow, showing a malformed .dng image file containing an embedded .zip archive. This archive extracts into an embedded .zip, which then unpacks into a loader component (b.so) and an XZ compressed file (l). The loader extracts l.so, providing backdoor functionality and loading additional components, with l.so being a decompressed SELinux policy manipulator.

Patch Status and Exposure for CVE-2025-21042 on Galaxy

A patch for CVE-2025-21042 was provided by Samsung within its April 2025 security maintenance release. Devices that installed that update—or any of the subsequent monthly updates—would be protected from the exploit path known at the time. The company did not respond to questions about how widespread the vulnerability was, how quickly it is patching affected devices, or when the patches are being distributed.

The calculus of risk is severe because Samsung is still the world’s No. 1 maker of smartphones by shipment, commanding as much as 20% of the global market. For an espionage adversary, a proven zero-day across two generations of Galaxy makes for a high-reward vector, even if the campaign were only aimed at specific users and not rampant consumer compromise.

Why This Case Matters for Mobile Zero-Day Spyware Risks

Landfall fits into a growing canon of mercenary spyware incidents that have relied on mobile zero-days, and a market that has faced ongoing criticism from civil society and regulators. Organizations including Citizen Lab and Amnesty International have documented cross-border surveillance operations using the same techniques time and again, as US and EU officials rush to blacklist or sanction certain vendors. These steps aside, the economics of private-sector offensive security still encourages the discovery and weaponization of mobile insecurities.

The defenders learn the same old lesson, but more urgently: shrink those patch windows, harden those default messaging behaviors, and invest in anomaly detection that’s been tuned to the mobile threat landscape.

Practical steps for at-risk users include:

  • Ensure the latest Android security updates are installed.
  • Switch off automatic media download in messaging apps where available.
  • Closely inspect app permissions.

None of them is a silver bullet against a zero-day, but all together reduce the attack surface.

Unit 42’s discovery is another data point in a larger trend: high-end mobile surveillance is now not the exception, it’s the operation. Lives and sensitive information can be most vulnerable in the window from discovery to patch deployment. Filling that gap is the industry’s most urgent problem.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Samsung pushed to deliver Galaxy Z Fold 8 with Qi2 and IP68
Google Messages Insights With Gemini Uncovered
Gemini arrives on Google Home and Nest devices
Galaxy S26 Ultra Camera Leaks Collide Over Telephoto
ChatGPT Voice Tests Show It Beats Gemini Live
EcoFlow Delta 2 Max Saves You $500 Today
Tiny VPN Router Becomes $50 Cheaper Just in Time for Holiday Travel
Video Shows Meteor Striking the Moon at High Speed
Joe Hill on the Stephen King References in King Sorrow
Elon Musk Wins Trillion-Dollar Tesla Pay Deal
Bunny Is a Hilarious, Heartfelt New York City Gem
iPhone 18 Pro Leak Suggests Transparent Back
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.