Skip to main content

Command Palette

Search for a command to run...

A photo, the whole device 'eavesdropped' - How was Samsung attacked?

Recently, the security research firm Unit 42 (part of Palo Alto Networks) released details about a spying campaign targeting Samsung Galaxy devices.

Updated
5 min read
A photo, the whole device 'eavesdropped' - How was Samsung attacked?

Overview

Recently, a dangerous event was recorded with just a seemingly harmless photo sent via WhatsApp, but it affected your entire Samsung Galaxy phone, and worse, it could be completely controlled by an attacker. No need to click on a link, no need to install strange apps, just a single image file is enough to open the door for attackers to infiltrate, eavesdrop, and steal all personal data.

This sophisticated espionage campaign was unveiled by researchers from Unit 42 (Palo Alto Networks) under the name “LANDFALL spyware”, exploiting the zero-day vulnerability CVE-2025-21042 in Samsung Galaxy devices. The frightening part is that the attack is deployed through seemingly normal-looking images—something most of us open every day. So, let's explore just how sophisticated and terrifying this campaign is.

Samsung 0-Day Exploited Via WhatsApp

Vulnerability Description

  • Vulnerability Code: CVE-2025-21042.

  • CVSS Score: 8.8/10, indicating a high severity level.

  • Attack Mechanism: An out-of-bounds write error (CWE-787) in Samsung's image processing library (libimagecodec.quram.so).

  • Consequences: Potential for remote exploitation and risk of RCE.

Scope of Impact

  • All Samsung Galaxy devices using the libimagecodec.quram.so library before the SMR Apr-2025 Release 1

  • Flagship devices like Galaxy S22, S23, S24, Z Fold4, Z Flip4

  • Operating system range: Android 13

Campaign Details

As mentioned earlier, this vulnerability exists due to an out-of-bounds write error. Simply put, an attacker can write to memory, leading to data being overwritten, damaging the memory structure, and potentially redirecting the control flow.

First, the attacker creates a DNG/JPEG image file with a format like: “IMG-20240723-WA0000.jpg” or “WhatsApp Image 2025-02-10 at 4.54.17 PM.jpeg”. The worrying part is that this file contains not just regular image data but also a ZIP archive appended to the end of the image file to include a malicious (.so) library.

Screenshot of a hexadecimal viewer displaying the contents of a WhatsApp image file named "WhatsApp Image 2025-02-10 at 4.54.17 PM.jpeg," indicating a start of an embedded ZIP archive within the file data.

Then the attacker will distribute these image files via WhatsApp, taking advantage of the app's automatic media processing.

WhatsApp Adds Media Previews in Notifications - MacStories

When WhatsApp receives the image file and calls the native API to display, preview, and create thumbnails, libimagecodec.quram.so performs the following main steps:

  • Receive and check the container/format

  • Parse the header and metadata

  • Process data segments/strips/tiles

  • Decompress/decode pixel data

  • Create thumbnails/preview/color processing

  • Handle attached/non-image data (if any)

And this is the weakest point: Handling attached/non-image data. Some files can append non-image data (for example, a ZIP archive added to the end of a DNG/JPEG). If the decoder tries to parse or decompress these blocks without checking the actual size, it can lead to out-of-bounds issues.

EXIF Steganography and image injection with go | by Totally_Not_A_Haxxer |  Medium

And of course, from here the attacker can easily execute RCE, which will activate malicious components to maintain and escalate privileges. LANDFALL then becomes very powerful:

  • Record from the microphone, record calls.

  • Track precise GPS location.

  • Access photos, contacts, call history, SMS/MMS messages, files, application databases.

  • Check device status (IMEI, IMSI, SIM, Bluetooth information, installed applications).

  • Capable of escalating privileges, maintaining stealth, and removing traces by manipulating SELinux.

According to experts, the consequences of a successful breach in this campaign are significant:

  • Users lose all privacy: devices are "eavesdropped," "monitored," and personal data is almost completely extracted.

  • For businesses or government individuals, being monitored can lead to the leakage of important information, greatly impacting national or organizational security.

  • Since this vulnerability was not previously disclosed and has been exploited since 2024, the likelihood of being compromised without knowing is very high.

Conclusion

The LANDFALL campaign clearly shows that a seemingly minor vulnerability in an image processing library can become a sophisticated espionage weapon. With just a specially crafted image sent through a messaging app, an attacker can execute remote code, access sensitive data, and maintain control over the device without the victim even knowing.

CVE‑2025‑21042 not only affects individual users but is also a serious threat to businesses, organizations, and government agencies, especially those with unpatched Samsung Galaxy devices. The wide range of impact, from Galaxy S22/S23/S24 flagships to the Z Fold/Flip series, and across Android versions 13–15, highlights the importance of timely patch management.

This campaign also underscores a concerning reality: in the digital age, even seemingly harmless media files can become sophisticated intrusion tools. Therefore, besides updating firmware, measures like disabling auto-download of media, restricting app permissions, deploying EDR/MDM, and monitoring IoC are crucial to protect users and organizations.

Recommendations

  1. UPDATE IMMEDIATELY — Samsung operating system and firmware

  2. Disable auto-download and media display in WhatsApp

    • Turn off automatic download of photos/videos in WhatsApp (Storage & Data → Media auto-download) and disable Media visibility to prevent the app from automatically processing or displaying files upon receipt.
  3. Control permissions

    • Review and restrict app permissions: microphone, camera, location, SMS, storage. Only grant "While using the app" permission or disable entirely if unnecessary.
  4. Install and run security software

    • Use a reliable mobile security application (Google Play Protect + Mobile AV/EDR) and perform a full scan if suspicious.
  5. Raise awareness and training

    • Train employees to be cautious with media files received from untrusted sources, even if they appear to be normal images.

    • Guide: do not enable auto-download of media; if a file is suspicious, request it be resent as a secure link or verify the source.

    • Establish device usage policies for employees with access to sensitive data: require MDM, limit BYOD, and conduct regular checks.

IOC

  1. Hash file

    • 9297888746158e38d320b05b27b0032b2cc29231be8990d87bc46f1e06456f93

    • b06dec10e8ad0005ebb9da24204c96cb2e297bd8d418bc1c8983d066c0997756

    • c0f30c2a2d6f95b57128e78dc0b7180e69315057e62809de1926b75f86516b2e

    • b975b499baa3119ac5c2b3379306d4e50b9610e9bba3e56de7dfd3927a96032d

    • 29882a3c426273a7302e852aa77662e168b6d44dcebfca53757e29a9cdf02483

    • b45817ffb0355badcc89f2d7d48eecf00ebdf2b966ac986514f9d971f6c57d18

    • ffeeb0356abb56c5084756a5ab0a39002832403bca5290bb6d794d14b642ffe2

    • d2fafc7100f33a11089e98b660a85bd479eab761b137cca83b1f6d19629dd3b0

  2. C2 (Command & Control)

    • 45.155.250[.]158

    • 46.246.28[.]75

    • [91.132.92[](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/?utm_source=chatgpt.com).]35

    • [92.243.65[](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/?utm_source=chatgpt.com).]240

    • 192.36.57[.]56

    • 194.76.224[.]127

    • brightvideodesigns[.]com

    • hotelsitereview[.]com

    • healthyeatingontherun[.]com

    • projectmanagerskills[.]com

Reference

  1. Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image

  2. LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices

  3. NVD - CVE-2025-21042

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.

A photo, the whole device 'eavesdropped' - How was Samsung attacked?