New Landfall spyware apparently targeting Samsung phones in Middle East
A new commercial-grade spyware has apparently been targeting Samsung Galaxy phones in the Middle East, but itβs not clear whoβs behind it, researchers said in a blog post Friday.
Whoeverβs responsible, they seized upon a previously unknown, unpatched vulnerability known as a zero-day β a flaw Samsung has since closed, the researchers from Palo Alto Networksβ Unit 42 said.
The company dubbed the spyware βLandfall.β The research indicates potential targets in Iran, Iraq, Morocco and Turkey, the blog post states. Itβs a campaign that has been underway since at least the middle of 2024, pointing to the spywareβs ability to remain hidden.
Landfall is embedded in malicious DNG image files that seem to have been sent via WhatsApp, although there is no indication of any new vulnerability with that messaging platform. WhatsApp has been fighting spyware on another front, in a ground-breaking legal battle against leading spyware vendor NSO Group.
It doesnβt appear to require any interaction with victims, a kind of exploit called βzero-click.β Once it infects a phone, Landfall has the kind of sweeping surveillance capabilities found in spyware sold by industry vendors, capable of activating microphone recording or collecting photos and contacts.
βWe believe the focus on Samsung Galaxy devices stems from the attackers exploiting a Samsung-specific image-processing zero-day, so the tooling was built for that environment,β Itay Cohen, senior principal researcher at Unit 42 told CyberScoop in an emailed comment. βThat said, we think weβre only seeing part of the activity. This isnβt isolated β this campaign delivering LANDFALL appears to be part of a broader DNG exploitation wave that also hit iPhone devices via a different zero-day. Itβs also possible that other mobile vendors were targeted using undiscovered vulnerabilities to deliver the same or similar implants.β
The spyware specifically targets S22, S23, S24 and Fold/Flip Samsung devices.
There are some potential clues as to who might be involved, but all of them are inconclusive, Palo Alto Networks said.
Landfallβs command and control infrastructure and domain registration patterns share similarities with a group known as Stealth Falcon, which has suspected links to the United Arab Emirates government.
βAs of October 2025, except in infrastructure, we have not observed direct overlaps between the mobile campaigns of LANDFALL and the endpoint-based activity from Stealth Falcon, nor direct strong links with Stealth Falcon,β Palo Alto Networks wrote. βHowever, the similarities are worth discussion.β
Samsung did not immediately respond to a request for comment.
The post New Landfall spyware apparently targeting Samsung phones in Middle East appeared first on CyberScoop.