A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April.
The surveillance campaign likely began in July 2024 and abused CVE-2025-21042 , a critical bug in Samsung's image-processing library that affects Galaxy devices running Android versions 13, 14, 15, and 16, according to Palo Alto Networks Unit 42 researchers who discovered the commercial-grade spyware and revealed details of the espionage attacks in a Friday report.
"This was a precision espionage campaign, targeting specific Samsung Galaxy devices in the Middle East, with likely victims in Iraq, Iran, Turkey, and M

The Register

Ars Technica
The Hacker News
TechCrunch
AlterNet
IndyStarSports
OK Magazine
Associated Press Top News
The Monroe News Sports
Just Jared
WNDU Sports
US Magazine