Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
969
4,663
2,168
Germany
A sophisticated spyware operation targeting Samsung Galaxy devices, dubbed LANDFALL, which exploited a zero-day vulnerability to infiltrate phones through seemingly innocuous images shared on WhatsApp.

This campaign, active since mid-2024, allowed attackers to deploy commercial-grade Android malware capable of full device surveillance without user interaction.

The discovery underscores ongoing threats from state-linked surveillance tools in the Middle East, where such intrusions have become alarmingly common.
Full Article here:
 
Full Article here:
Thanks for sharing this, Brownie2019. That's a nasty piece of work—exploiting a zero-day via WhatsApp images is straight out of a cyber thriller, but sadly all too real. It's a good reminder of how even "innocuous" shares can be weaponized, especially with state-linked tools in play.

For anyone with a Samsung Galaxy, make sure you're on the latest security patches—Samsung's been pretty quick with updates lately. Also, double-check your WhatsApp settings for auto-downloads and consider using a reputable security app for extra layers. If you've got any details on affected models or mitigation steps from the article, feel free to elaborate!
 
So if I stay away from anything Facebook then I should be safe?
The exploit didn't use a vulnerability in WhatsApp but rather in Samsung's library. It could have potentially used any messaging app that preprocesses images in the same way.

If you need to protect against PEGASUS and now LANDFALL type 0-day attacks (usually stemming from commercial spyware companies or state actors), using a smartphone may be too risky. Even heads of states didn't escape PEGASUS attacks.