Samsung Galaxy Fiasco: LANDFALL Spyware Exploits Zero-Day in Middle East Mayhem
The LANDFALL spyware exploited the Samsung zero-day CVE-2025-21042, spreading through DNG image files via WhatsApp. This zero-click malware targeted Samsung Galaxy devices in the Middle East, enabling stealthy surveillance and data theft. Samsung has since patched the vulnerability, but the sophistication of this spyware campaign underscores the risks of image-processing flaws.

Hot Take:
Samsung Galaxy users in the Middle East have gotten a crash course in the dangers of zero-day vulnerabilities. Thanks to LANDFALL spyware, their phones have become less “smart” and more “spy.” It seems that if your phone is full of surprises, it’s not always a good thing—especially when they’re orchestrated by malware!
Key Points:
- Sneaky Samsung Galaxy vulnerability CVE-2025-21042 was exploited by LANDFALL spyware.
- LANDFALL used malicious DNG image files on WhatsApp for zero-click installation.
- The spyware recorded audio, tracked locations, and stole data without user interaction.
- LANDFALL targeted flagship Samsung models and operated in the Middle East.
- The campaign shares traits with known commercial spyware operations, hinting at private-sector involvement.
Already a member? Log in here
