Samsung Galaxy Fiasco: LANDFALL Spyware Exploits Zero-Day in Middle East Mayhem

The LANDFALL spyware exploited the Samsung zero-day CVE-2025-21042, spreading through DNG image files via WhatsApp. This zero-click malware targeted Samsung Galaxy devices in the Middle East, enabling stealthy surveillance and data theft. Samsung has since patched the vulnerability, but the sophistication of this spyware campaign underscores the risks of image-processing flaws.

Pro Dashboard

Hot Take:

Samsung Galaxy users in the Middle East have gotten a crash course in the dangers of zero-day vulnerabilities. Thanks to LANDFALL spyware, their phones have become less “smart” and more “spy.” It seems that if your phone is full of surprises, it’s not always a good thing—especially when they’re orchestrated by malware!

Key Points:

  • Sneaky Samsung Galaxy vulnerability CVE-2025-21042 was exploited by LANDFALL spyware.
  • LANDFALL used malicious DNG image files on WhatsApp for zero-click installation.
  • The spyware recorded audio, tracked locations, and stole data without user interaction.
  • LANDFALL targeted flagship Samsung models and operated in the Middle East.
  • The campaign shares traits with known commercial spyware operations, hinting at private-sector involvement.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?