LANDFALL New Commercial-Grade Android Spyware in Exploit Cha... #1559
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What was uncovered
Unit 42 analyzed a commercial‑grade Android spyware family dubbed LANDFALL that targets Samsung Galaxy devices. Delivery leveraged malformed DNG images (TIFF‑based) that exploit Samsung’s image parsing zero‑day CVE‑2025‑21042 (vendor SVE‑2024‑1969). The DNGs carry an embedded ZIP archive appended at EOF; upon successful exploitation in
libimagecodec.quram.so, shared objects from the ZIP are extracted and executed, staging the LANDFALL framework. Activit...🔧 Technical Details
DNG parser RCE via appended ZIP payloads: Craft a DNG (TIFF‑based) with an embedded ZIP archive at EOF. On vulnerable parsers (e.g., Samsung
libimagecodec.quram.so, CVE‑2025‑21042), malformed DNG parsing leads to code execution, allowing extraction and execution of bundled.sopayloads. Messaging apps that auto‑process media previews can yield zero‑click infection when chained with a content‑fetch primitive (e.g., WhatsApp CVE‑2025‑55177 on Apple platforms).Dynamic SELinux policy expansion for post‑exploit privilege widening: Run a dedicated module (
l.so) that implements a generic SELinux policy engine. Usesepolicy_from_data/sepolicy_add_statement/sepolicy_to_bufferto inject permissive rules in memory, expanding domains/permissions to enable stealthy persistence, broader IPC/file/service access, and resilient collection without dropping static policy blobs.Hardene...
🤖 Agent Actions
I analyzed the blog and HackTricks repo, and added the new technical content where it best fits: the existing Structural File‑Format Exploit Detection page under Generic Methodologies & Resources > Basic Forensic Methodology > Specific Software/File-Type Tricks.
What I updated:
Files modified:
Changes summary:
No new files were created; the content integrates into the existing structural detection methodology, keeping it concise and highly technical.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).