Experts from Palo Alto Networks' Unit 42 team have discovered a new spyware campaign called Landfall that is attacking Android devices.
The software exploits a security vulnerability CVE-2025-21042 in Samsung's image processing library, allowing hackers to compromise phones with just a malicious image file sent to the device.
Worryingly, this is a “zero-click” attack, meaning the victim doesn’t need to open or touch the file — just receiving the image can infect their machine. .DNG images sent via popular apps like WhatsApp can trigger the vulnerability.
Samsung released a patch in April 2025, but according to researchers, the Landfall spyware had been operating silently since July 2024, lasting nearly a year before being detected.
The targeted phone models are mainly Galaxy S22, S23, S24 and folding lines such as Z Fold 4, Z Flip 4, running Android 13 to 15 operating systems.
The victims were mostly located in the Middle East and North Africa region, including Iran, Iraq, Türkiye and Morocco.
Once infiltrated, the spyware is capable of recording audio, turning on secret cameras; accessing messages, contacts, call history; tracking the victim's real-time location.
Although Samsung has patched the vulnerability, experts warn that similar vulnerabilities may still exist that have not been disclosed.
Therefore, users should ensure that their phones are always updated with the latest system; Do not open photos or files from strangers, even on popular applications like WhatsApp; Monitor for unusual signs such as hot devices, rapid battery drain, or sudden increase in background data.
Experts stress that vulnerabilities like Landfall are difficult to detect before they are exploited, so major tech companies are ramping up security features — like Apple’s Lockdown Mode or Google’s live threat detection system on Android — to protect users from increasingly sophisticated attacks.
Source: https://baophapluat.vn/dien-thoai-samsung-galaxy-co-the-bi-hack-chi-bang-mot-hinh-anh.html






Comment (0)