Palo Alto Networks Unit 42 revealed that LANDFALL spyware exploited a Samsung zero-day (CVE-2025-21042) via malicious DNG images sent through WhatsApp.

The Android spyware targeted Galaxy flagship models across the Middle East before Samsung patched it in April 2025.

LANDFALL collected sensitive user data, connected to C2 servers, and persisted via SELinux manipulation — showing how refined mobile exploits have become.

Follow @technadu for continuous coverage on advanced threat campaigns and mobile security research.

#InfoSec #AndroidSecurity #Samsung #LANDFALL #ZeroDay #CyberThreats #MobileSpyware #Privacy #TechNadu

KidsGuard stalkerware leaks data on secretly surveilled victims

Naked Security