Newly identified Android spyware appears to be from a commercial vendor
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读文章,抓住主要信息。 文章讲的是安全研究人员发现了一款名为LANDFALL的商业级间谍软件,用于针对三星Galaxy手机的9个月黑客活动,主要集中在中东地区。间谍软件利用了零日漏洞,通过WhatsApp发送恶意DNG图像文件,窃取数据并监控目标。 接下来,我需要提取关键点:LANDFALL的功能、传播方式、受影响的设备型号、漏洞修复时间以及可能的幕后黑手。 然后,我要把这些信息浓缩成一段简洁的话,确保不超过100字。同时,避免使用“文章内容总结”之类的开头词。 最后,检查一下语言是否流畅自然,信息是否准确全面。 </think> 安全研究人员发现了一款名为LANDFALL的商业级间谍软件,用于针对三星Galaxy手机的9个月黑客活动。该软件利用零日漏洞通过WhatsApp发送恶意DNG图像文件,窃取数据并监控目标。受影响设备包括Galaxy ZFold4、ZFlip4和S22/23/24系列。漏洞于2025年4月修复。 2025-11-7 17:23:39 Author: therecord.media(查看原文) 阅读量:8 收藏

Security researchers on Friday revealed the discovery of “commercial grade” spyware used in a 9-month-long hacking campaign aimed at Samsung Galaxy phones likely concentrated in the Middle East.

The Android spyware, dubbed LANDFALL, exploited a zero-day, or previously undocumented, vulnerability in Galaxy phones’ image processing libraries. The spyware was likely sent via the WhatsApp messaging platform to exfiltrate data and snoop on targets. 

LANDFALL, which may have been zero-click, allowed microphone recording, location tracking, call recording, collection of photos and text message, contacts and call history exfiltration, according to researchers at Palo Alto Networks’ Unit 42. Zero-click spyware requires no direct action from a device user.

The security flaw was patched in April 2025 and has been tracked as CVE-2025-21042. The hackers sent victims malformed Digital Negative (DNG) images — a form of TIFF image files. The images had an “embedded ZIP archive appended to the end of the file” that exploited the bug. Unit 42 said. 

The campaign shares “tradecraft patterns” and infrastructure with commercial spyware operations in the Middle East, suggesting potential ties to private sector manufacturers, the researchers said in a blog post.

The vendor and government behind LANDFALL remain unknown and it is not clear how many people were targeted, according to Unit 42. Researchers there believe the campaign was designed for snooping.

"This was not mass-distributed malware but a precision attack,” said Itay Cohen, a senior principal researcher at Unit 42. “The sophisticated infrastructure, bespoke payload design, and use of zero-day vulnerabilities are all hallmarks of an espionage-motivated operation, not a financial or consumer-scale campaign."

LANDFALL’s command and control infrastructure and domain registration patterns are similar to 

those used by Stealth Falcon, a hacking group with strong ties to the United Arab Emirates, the researchers said. Stealth Falcon has been tied to dozens of spyware cases involving countries in Africa and the Middle East.

There are no “direct overlaps” between LANDFALL’s mobile campaigns and the “endpoint-based activity from Stealth Falcon, nor direct strong links with Stealth Falcon,” the blog post said. “However, the similarities are worth discussion.”

The LANDFALL samples the researchers found were submitted to the VirusTotal repository in 2024 and 2025, the researchers said, indicating potential targets in Iraq, Iran, Turkey and Morocco.

Turkey's cyber readiness team, known as USOM, also reported IP addresses used by LANDFALL's command and control servers as malicious, suggesting possible Turkish victims, the researchers said.

The vulnerability was privately reported to Samsung in September 2024 but the company did not release a firmware update to fix it until April 2025, the researchers said. Samsung did not respond to a request for comment.

Targeted device models include the Galaxy ZFOLD4, Galaxy ZFlip4 and S22, 23 and S24 Series, according to the blog post.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.


文章来源: https://therecord.media/landfall-spyware-middle-east-appears-commercial-grade
如有侵权请联系:admin#unsafe.sh