Samsung phones had a notable security risk before the April 2025 patch. This vulnerability was in their image processing library and allowed a zero-click attack. This means an attacker didn’t need users to do anything. Instead, a malicious image could exploit the system while simply being displayed. It could activate the Landfall spyware and modify the device’s SELinux policy, giving the spyware more access to sensitive data.
According to a recent report from Unit 42, the Landfall spyware was delivered mainly via messaging apps like WhatsApp. It targeted specific models, including the Galaxy S22 and Galaxy Z Fold 4. Once active, it could gather a lot of personal information—like user IDs, contacts, installed apps, and even browsing history. The spyware could also turn on the camera and microphone, effectively spying on users.
Removing this spyware is tricky. Its ability to change critical system policies allows it to hide deep within the software. Users in certain regions, including Iraq and Turkey, were notably affected during 2024 and early 2025. This vulnerability may have persisted across Android versions 13 to 15.
Interestingly, the naming conventions and server responses of Landfall show striking similarities to spyware developed by well-known cyber intelligence firms like the NSO Group. Unit 42 couldn’t directly tie the malware to any particular group, but the attack was quite targeted.
This situation highlights a concerning trend—where details about such attacks become publicly available, making it easier for other malicious actors to replicate similar methods. To stay safe, Samsung users should ensure their devices are updated with the latest security patches.
For a broader perspective, cybersecurity firm Statista notes that mobile malware attacks have increased significantly in recent years. In 2022 alone, reports indicated that over 90 million mobile devices faced malware threats. This rising trend underscores the importance of continuous vigilance and keeping devices updated.
In conclusion, cybersecurity remains an ongoing challenge. With methods evolving, it’s essential for users to be proactive about their device security.
Source link

