FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News

Samsung Flagships Exposed to 1 Year of Data Theft

Gregory Zuckerman
Last updated: November 10, 2025 5:18 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

New research from Palo Alto Networks’ Unit 42 shows more than a year of top-of-the-line Samsung Galaxy phones were vulnerable to a stealthy hacking attack that could have allowed attackers to remotely spy on users.

The malware, which has been dubbed “LANDFALL” by researchers who tracked it, reportedly exploited a zero-day flaw in Samsung’s image parsing library, allowing attackers to steal personal data without tapping—or any user action, for that matter—before Samsung patched the issue in a security update.

Table of Contents
  • How the LANDFALL Attack Worked on Galaxy Phones
  • Which Galaxy Models Were Impacted by LANDFALL
  • Why This Zero-Day Matters for Samsung Galaxy Phones
  • What Samsung Users Can Do Now to Stay Protected
  • Who Discovered It and How It Was Resolved
A dark gray Samsung smartphone is displayed against a professional flat design background with soft patterns and gradients. The phone is shown from the front and back, highlighting its camera array and screen.

The operation depended on malicious Digital Negative (DNG) image files sent through mainstream messaging applications. When the targeted device processed the maliciously crafted image, the spyware established itself and automatically started data theft but “routinely masked” its own actions. The campaign is described by Unit 42 as not being randomly launched but rather targeted, with activities focused in a few areas.

The models that are out for attention from researchers include the Galaxy S22 and S23 ranges, the Galaxy S24 collection of devices, and Samsung’s foldables like the Galaxy Z Fold 4 and Galaxy Z Flip 4. The vulnerable scope covered One UI iterations that are built on recent Android versions, once again illustrating how even flagship devices that are fully updated can be exploited when a zero-day is involved.

How the LANDFALL Attack Worked on Galaxy Phones

DNG is a raw photo format that devices regularly parse to generate previews and extract metadata. LANDFALL weaponized that routine step. As reported by Unit 42, the vulnerability in question was exploited using a malformed DNG image that triggered a flaw in Samsung’s code to process images; just touching this one file resulted in system-level code execution—no click, no install prompt, nothing.

When active, the spyware could silently exfiltrate photos, contacts, call logs, and device identifiers; record microphone sound bites; and track location. Researchers also spotted methods for circumventing modern protections: hiding within trusted system processes, minimizing file-system footprints, and throttling activity to avoid triggering usage or battery anomalies. This stealth probably helped prolong the campaign.

Which Galaxy Models Were Impacted by LANDFALL

Unit 42’s analysis cites the Galaxy S22, a high-end line likely in the works alongside the Galaxy S23 and Galaxy S24 series, as well as the Galaxy Z Fold 4 and Galaxy Z Flip 4. The affected software spanned multiple One UI generations based on recent Android releases. Signal was allegedly spread through regular functionality, though the tainted photographs were also sent over common messengers including WhatsApp.

In this case, the campaign seems to be targeting certain geographies and victims—much like the intrusion activity observed in similar mobile espionage cases. Though there is no evidence of widespread, sustained exploitation in the wild after Samsung’s fix, devices that have not recently received a Google security update may still be vulnerable.

Three Samsung smartphones, one white, one gray, and one purple, are laid out on a textured gray surface.

Why This Zero-Day Matters for Samsung Galaxy Phones

Image parsing has emerged as a fertile attack surface on all platforms, as it involves complex, untrusted content that one often does not have to take an explicit action to receive. High-profile iOS attacks in the last several years, for instance, have also exploited media-handling vulnerabilities to facilitate so-called zero-click compromises. LANDFALL follows that strain on Android by breaching the instant a device opens a booby-trapped file.

The stakes are raised by Samsung’s size. With 20% of worldwide smartphone market share according to some market trackers (including Counterpoint Research), and its status as the world’s largest Android manufacturer, a persistent zero-day hitting Galaxy flagships has outsized impact, even when a campaign is tightly focused. And it demonstrates how state-of-the-art mobile defenses, from sandboxing and permission gating to on-device ML, can be circumvented once attackers achieve code execution within trusted components.

What Samsung Users Can Do Now to Stay Protected

Update immediately. Get the latest One UI and Android security patch via Settings, then get the latest Google Play system update too. Consider enabling automatic updates to shrink the exposure windows for future fixes.

For extra risk mitigation, you could restrict automatic media downloads in your messaging apps, keep Google Play Protect switched on, refrain from sideloading APKs, and make sure that even files from contacts you know get a second look. Zero-click attacks eliminate the tap, but layered hygiene still blunts delivery and persistence in many real-world scenarios.

Who Discovered It and How It Was Resolved

Palo Alto Networks’ Unit 42 claims to have found the malware family and backtracked its origin to Samsung’s image library, following standard responsible disclosure procedures. Samsung fixed the problem with a security maintenance release, and it usually acknowledges external security reports in its bulletins. Those who regularly install vendor patches are safe, though those on older builds must consider the importance of an update.

LANDFALL is a reminder that the most dangerous mobile threats come in the form of everyday content, hiding right in front of you. The fix is simple—update—but the lesson is lasting: high-end phones with good security designs require timely patches to stay ahead of fast-moving adversaries.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Yoshi Design Leaks in Galaxy Movie Cookies, According to Report
Google Maps Introduces AI Tools for Creative Projects
Galaxy S26 Leak Suggests Thickening Design After Pro Departure
Apple Pulls Gay Dating Apps From China App Store
Venmo Debit Card Rewards to Launch Up to 5%
Sapphire Sport rebrands as 359 Capital, at $300M AUM
Miles McBride Debuts Mmotion to Rival Snap Map
Amazon Music Launches Chat And Group Streaming In Canada
Galaxy S26 Plus Renders Show Double-Stacked Camera
GameHub Comes To Play Store With Steam Library Support
The Best Sleep Trackers of 2025 for Every Sleeper
Samsung Integrates iFIT Trainer Workouts Into Health App
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.