A photo, the whole device 'eavesdropped' - How was Samsung attacked?
Recently, the security research firm Unit 42 (part of Palo Alto Networks) released details about a spying campaign targeting Samsung Galaxy devices.

Overview
Recently, a dangerous event was recorded with just a seemingly harmless photo sent via WhatsApp, but it affected your entire Samsung Galaxy phone, and worse, it could be completely controlled by an attacker. No need to click on a link, no need to install strange apps, just a single image file is enough to open the door for attackers to infiltrate, eavesdrop, and steal all personal data.
This sophisticated espionage campaign was unveiled by researchers from Unit 42 (Palo Alto Networks) under the name “LANDFALL spyware”, exploiting the zero-day vulnerability CVE-2025-21042 in Samsung Galaxy devices. The frightening part is that the attack is deployed through seemingly normal-looking images—something most of us open every day. So, let's explore just how sophisticated and terrifying this campaign is.

Vulnerability Description
Vulnerability Code: CVE-2025-21042.
CVSS Score: 8.8/10, indicating a high severity level.
Attack Mechanism: An out-of-bounds write error (CWE-787) in Samsung's image processing library (
libimagecodec.quram.so).Consequences: Potential for remote exploitation and risk of RCE.
Scope of Impact
All Samsung Galaxy devices using the
libimagecodec.quram.solibrary before the SMR Apr-2025 Release 1Flagship devices like Galaxy S22, S23, S24, Z Fold4, Z Flip4
Operating system range: Android 13
Campaign Details
As mentioned earlier, this vulnerability exists due to an out-of-bounds write error. Simply put, an attacker can write to memory, leading to data being overwritten, damaging the memory structure, and potentially redirecting the control flow.
First, the attacker creates a DNG/JPEG image file with a format like: “IMG-20240723-WA0000.jpg” or “WhatsApp Image 2025-02-10 at 4.54.17 PM.jpeg”. The worrying part is that this file contains not just regular image data but also a ZIP archive appended to the end of the image file to include a malicious (.so) library.


Then the attacker will distribute these image files via WhatsApp, taking advantage of the app's automatic media processing.

When WhatsApp receives the image file and calls the native API to display, preview, and create thumbnails, libimagecodec.quram.so performs the following main steps:
Receive and check the container/format
Parse the header and metadata
Process data segments/strips/tiles
Decompress/decode pixel data
Create thumbnails/preview/color processing
Handle attached/non-image data (if any)
And this is the weakest point: Handling attached/non-image data. Some files can append non-image data (for example, a ZIP archive added to the end of a DNG/JPEG). If the decoder tries to parse or decompress these blocks without checking the actual size, it can lead to out-of-bounds issues.

And of course, from here the attacker can easily execute RCE, which will activate malicious components to maintain and escalate privileges. LANDFALL then becomes very powerful:
Record from the microphone, record calls.
Track precise GPS location.
Access photos, contacts, call history, SMS/MMS messages, files, application databases.
Check device status (IMEI, IMSI, SIM, Bluetooth information, installed applications).
Capable of escalating privileges, maintaining stealth, and removing traces by manipulating SELinux.
According to experts, the consequences of a successful breach in this campaign are significant:
Users lose all privacy: devices are "eavesdropped," "monitored," and personal data is almost completely extracted.
For businesses or government individuals, being monitored can lead to the leakage of important information, greatly impacting national or organizational security.
Since this vulnerability was not previously disclosed and has been exploited since 2024, the likelihood of being compromised without knowing is very high.
Conclusion
The LANDFALL campaign clearly shows that a seemingly minor vulnerability in an image processing library can become a sophisticated espionage weapon. With just a specially crafted image sent through a messaging app, an attacker can execute remote code, access sensitive data, and maintain control over the device without the victim even knowing.
CVE‑2025‑21042 not only affects individual users but is also a serious threat to businesses, organizations, and government agencies, especially those with unpatched Samsung Galaxy devices. The wide range of impact, from Galaxy S22/S23/S24 flagships to the Z Fold/Flip series, and across Android versions 13–15, highlights the importance of timely patch management.
This campaign also underscores a concerning reality: in the digital age, even seemingly harmless media files can become sophisticated intrusion tools. Therefore, besides updating firmware, measures like disabling auto-download of media, restricting app permissions, deploying EDR/MDM, and monitoring IoC are crucial to protect users and organizations.
Recommendations
UPDATE IMMEDIATELY — Samsung operating system and firmware
Update Samsung's SMR/security patch to the latest version (the CVE-2025-21042 patch was released in SMR Apr-2025). This is the most effective measure to close the code execution vulnerability from image files.
Disable auto-download and media display in WhatsApp
- Turn off automatic download of photos/videos in WhatsApp (Storage & Data → Media auto-download) and disable Media visibility to prevent the app from automatically processing or displaying files upon receipt.
Control permissions
- Review and restrict app permissions: microphone, camera, location, SMS, storage. Only grant "While using the app" permission or disable entirely if unnecessary.
Install and run security software
- Use a reliable mobile security application (Google Play Protect + Mobile AV/EDR) and perform a full scan if suspicious.
Raise awareness and training
Train employees to be cautious with media files received from untrusted sources, even if they appear to be normal images.
Guide: do not enable auto-download of media; if a file is suspicious, request it be resent as a secure link or verify the source.
Establish device usage policies for employees with access to sensitive data: require MDM, limit BYOD, and conduct regular checks.
IOC
Hash file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 (Command & Control)
45.155.250[.]158
46.246.28[.]75
[91.132.92[](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/?utm_source=chatgpt.com).]35
[92.243.65[](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/?utm_source=chatgpt.com).]240
192.36.57[.]56
194.76.224[.]127
brightvideodesigns[.]com
hotelsitereview[.]com
healthyeatingontherun[.]com
projectmanagerskills[.]com






