By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: These Galaxy phones were attacked by spyware for nearly a year before a patch was released
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > These Galaxy phones were attacked by spyware for nearly a year before a patch was released
News

These Galaxy phones were attacked by spyware for nearly a year before a patch was released

News Room
Last updated: 2025/11/09 at 10:03 PM
News Room Published 9 November 2025
Share
These Galaxy phones were attacked by spyware for nearly a year before a patch was released
SHARE
A zero-day vulnerability (CVE-2025-21042) in Samsung’s Android image processing library allowed attackers to embed spyware called LANDFALL in Samsung devices including Galaxy handsets. Here are some definitions; a zero-day vulnerability is one that no one knows about giving the developer zero days to come up with a way to patch the flaw. Samsung’s Android image processing library handles the decoding and processing of various image formats, including some formats that are proprietary to Samsung.

The LANDFALL spyware impacted certain Samsung phones

The thing is, LANDFALL was exploited in the wild before Samsung was able to patch the vulnerability this past April. However, the exploitation and the spyware employed have never been discussed publicly until this past week. LANDFALL was embedded in malicious DNG image files that were sent via WhatsApp. According to the Palo Alto Network, LANDFALL was operating in the middle of 2024 which was months before the vulnerability was patched.
As for the involvement of WhatsApp delivering the Samsung exploit, this has been denied by WhatsApp owner Meta according to a report from Forbes. Meta says that it has not found any basis to support this aspect of the story and says that there is no evidence to support the claim.

LANDFALL hasn’t been a threat since this past April although another zero-day vulnerability was patched by Samsung just two months ago during September. This flaw (CVE-2025-21043) was also found in the imaging processing library. The patch prevents any attack from taking place.

The spyware used microphone recording, location tracking, and photos for surveillance 

Itay Cohen, a senior principal researcher at Palo Alto Network’s Unit 42 said that the LANDFALL attack was targeted at certain individuals and was not mass-distributed. Cohen says that the motive for these attacks was espionage.

We should point out that the LANDFALL spyware was designed for attacks against the Samsung Galaxy line mostly with targeted attacks taking place primarily in the Middle East including Turkey, Iran, Iraq, and Morocco. Being spyware, it shouldn’t be a surprise that LANDFALL used microphone recording, location tracking, photos, contacts. A malformed image file, one that has been deliberately corrupted to set off a flaw in the software that reads the file, was used in the attacks. No clicks were required to exploit the vulnerability.

As soon as the image was received by the targeted Galaxy phone, the device was compromised. Once these photos were opened or previewed, the phone could be used by attackers to:
  • Record microphone audio and phone calls.
  • In real time, track GPS location.
  • Access photos, messages, contacts, call logs, and browsing history.
  • Hide from antivirus scans and even remain active after reboots.
Reports say that the Samsung phones most attacked by LANDFALL include the Galaxy S22 line. Galaxy S23 line, Galaxy S24 line, Z Fold 4 and Z Flip 4 foldables. The Galaxy S25 series was not targeted by the spyware. 

For 10 months targeted phones were extremely vulnerable

There was a period of 10 months between the time the campaign began in July 2024 and when the flaw was patched in April of this year when the aforementioned Galaxy models were at the peak of their vulnerability. When Samsung patched the vulnerability this past April, the company made no public statement about it.

Security experts recommend that Samsung Galaxy users with a handset powered by Android 13-15 make sure that they installed the April 2025 Android Security update or later just to make sure that they have the exploit patched on their phones. Automatic media downloads for messaging apps like WhatsApp and Telegram should be disabled. They should also enable Android’s Advanced Protection mode or iOS’s Lockdown Mode if they consider themselves to be a high-risk user.

Iconic Phones is now up for pre-order in the US!

Our new coffee table book, Iconic Phones, is a stunning visual tribute to the legends in the world of phones, featuring exclusive high-resolution photography, stories, quotes and fun trivia. Pre-order now and save 15% with code: PARENA15


Pre-order now

Read the latest from Alan Friedman

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article China has a plan to repeat with cars what it already did with cell phones. And that plan has already begun China has a plan to repeat with cars what it already did with cell phones. And that plan has already begun
Next Article Honor unveils plans for world’s first AI-powered robot phone next year · TechNode Honor unveils plans for world’s first AI-powered robot phone next year · TechNode
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Common Crawl accused of giving paywalled content to AI companies
Common Crawl accused of giving paywalled content to AI companies
News
President Trump greeted with mostly boos, some cheers at Commanders-Lions game
Software
3 Bad Charging Habits That Are Ruining Your Android Tablet (And What To Do Instead) – BGR
3 Bad Charging Habits That Are Ruining Your Android Tablet (And What To Do Instead) – BGR
News
YouTube TV is paying up: Here’s how to claim your  Disney blackout credit
YouTube TV is paying up: Here’s how to claim your $20 Disney blackout credit
News

You Might also Like

Common Crawl accused of giving paywalled content to AI companies
News

Common Crawl accused of giving paywalled content to AI companies

5 Min Read
3 Bad Charging Habits That Are Ruining Your Android Tablet (And What To Do Instead) – BGR
News

3 Bad Charging Habits That Are Ruining Your Android Tablet (And What To Do Instead) – BGR

8 Min Read
YouTube TV is paying up: Here’s how to claim your  Disney blackout credit
News

YouTube TV is paying up: Here’s how to claim your $20 Disney blackout credit

4 Min Read
Future of Apple Fitness+ ‘Under Review’
News

Future of Apple Fitness+ ‘Under Review’

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?