CISA orders feds to patch Samsung zero-day used in spyware attacks
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内。首先,我需要通读整篇文章,抓住关键点。 文章主要讲的是CISA命令美国联邦机构修补三星的一个关键漏洞,这个漏洞被用于零日攻击,部署间谍软件LandFall。漏洞的编号是CVE-2025-21042,属于越界写入安全缺陷,存在于三星的libimagecodec.quram.so库中。这个漏洞允许远程攻击者在运行Android 13及以上的设备上执行代码。 三星在四月份修补了这个漏洞,但Palo Alto Networks的Unit 42上周披露,攻击者自2024年7月以来一直在利用它。通过恶意DNG图像发送到WhatsApp来部署间谍软件。 间谍软件LandFall可以访问浏览历史、录音、跟踪位置、访问照片、联系人、短信等。目标包括三星的多款旗舰机型,如Galaxy S22、S23、S24系列和Z Fold 4、Z Flip 4等。 潜在目标国家包括伊拉克、伊朗、土耳其和摩洛哥。C2基础设施和注册模式与Stealth Falcon的操作相似,后者起源于阿联酋。此外,恶意软件加载器组件使用“Bridge Head”名称,常见于NSO Group等公司开发的商业间谍软件中。 CISA将该漏洞加入已知被利用的漏洞目录,并要求联邦机构在三周内修补设备。虽然指令仅适用于联邦机构,但CISA敦促所有组织尽快修补。 总结一下:CISA要求联邦机构修补三星漏洞CVE-2025-21042,该漏洞被用于零日攻击部署间谍软件LandFall,影响多款三星设备,并针对特定国家。 </think> CISA要求美国联邦机构修复三星设备中的关键安全漏洞CVE-2025-21042,该漏洞被用于零日攻击部署间谍软件LandFall。该漏洞影响多款三星旗舰设备,并针对特定国家。 2025-11-10 20:15:23 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

CISA

CISA ordered U.S. federal agencies today to patch a critical Samsung vulnerability that has been exploited in zero-day attacks to deploy LandFall spyware on devices running WhatsApp.

Tracked as CVE-2025-21042, this out-of-bounds write security flaw was discovered in Samsung's libimagecodec.quram.so library, allowing remote attackers to gain code execution on devices running Android 13 and later.

While Samsung patched it in April following a report from Meta and WhatsApp Security Teams, Palo Alto Networks' Unit 42 revealed last week that attackers had been exploiting it since at least July 2024 to deploy previously unknown LandFall spyware via malicious DNG images sent over WhatsApp.

Wiz

The spyware is capable of accessing the victim's browsing history, recording calls and audio, tracking their location, as well as accessing photos, contacts, SMS, call logs, and files.

According to Unit 42's analysis, it targets a wide range of Samsung flagship models, including the Galaxy S22, S23, and S24 series devices, as well as the Z Fold 4 and Z Flip 4.

​Data from VirusTotal samples examined by Unit 42 researchers shows potential targets in Iraq, Iran, Turkey, and Morocco, while C2 domain infrastructure and registration patterns share similarities with those seen in Stealth Falcon operations, which originated from the United Arab Emirates.

Another clue is the use of the "Bridge Head" name for the malware loader component, a naming convention commonly seen in commercial spyware developed by NSO Group, Variston, Cytrox, and Quadream. However, LandFall could not be confidently linked to any known spyware vendors or threat groups.

CVE-2025-21042 exploitation timeline
CVE-2025-21042 exploitation timeline (Unit 42)

CISA has now added the CVE-2025-21042 flaw to its Known Exploited Vulnerabilities catalog, which lists security bugs flagged as actively exploited in attacks, ordering Federal Civilian Executive Branch (FCEB) agencies to secure their Samsung devices against ongoing attacks within three weeks, until December 1, as mandated by the Binding Operational Directive (BOD) 22-01.

FCEB agencies are non-military agencies within the U.S. executive branch, including the Department of Energy, the Department of the Treasury, the Department of Homeland Security, and the Department of Health and Human Services.

While this binding operational directive only applies to federal agencies, CISA has urged all organizations to prioritize patching this security flaw as soon as possible.

"This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise," it warned.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable," the cybersecurity agency added.

In September, Samsung released security updates to patch another libimagecodec.quram.so flaw (CVE-2025-21043) that was exploited in zero-day attacks targeting its Android devices.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/
如有侵权请联系:admin#unsafe.sh