Samsung’s Sneaky Spyware Saga: When Your Selfies Double as Surveillance!
A sneaky vendor exploited a zero-day vulnerability in Samsung’s image processing library to deliver the Landfall spyware to Galaxy users in the Middle East. This malicious escapade spanned from mid-2024 until April 2025. Unit 42 discovered the Landfall threat, which secretly records conversations and tracks device locations.

Hot Take:
Another day, another zero-day! It seems like our favorite spy thriller authors are now moonlighting as cybersecurity researchers, with secretive espionage tools and digital sleuthing becoming the norm. The real kicker? Our phones are the new espionage hotspots, complete with hidden mics, secret cameras, and enough drama to make James Bond blush. Time to put on our tinfoil hats, folks!
Key Points:
– A zero-day vulnerability in Samsung’s Android image processing library was exploited to deploy spyware on Samsung Galaxy devices.
– The malware, dubbed “Landfall,” allows for extensive surveillance including recording conversations and tracking device locations.
– Attacks were primarily targeted at users in the Middle East, with a notable focus on Iraq, Iran, Turkey, and Morocco.
– The exploit chain resembled similar attacks on iOS, indicating a coordinated effort across mobile platforms.
– The spyware’s infrastructure showed potential ties to the UAE, though not definitively confirmed.
