New Spyware Exploited a Samsung 0-Day Delivered Through Whatsapp Messages
Postedabout 2 months agoActiveabout 2 months ago
unit42.paloaltonetworks.comTechstory
calmneutral
Debate
10/100
SpywareAndroid SecurityWhatsapp Vulnerability
Key topics
Spyware
Android Security
Whatsapp Vulnerability
A new commercial-grade Android spyware was discovered exploiting a Samsung 0-day vulnerability delivered through WhatsApp messages, sparking interest in the technical details of the exploit.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
14m
Peak period
1
0-1h
Avg / period
1
Key moments
- 01Story posted
Nov 8, 2025 at 5:41 AM EST
about 2 months ago
Step 01 - 02First comment
Nov 8, 2025 at 5:55 AM EST
14m after posting
Step 02 - 03Peak activity
1 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Nov 8, 2025 at 5:55 AM EST
about 2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45855731Type: storyLast synced: 11/17/2025, 5:57:06 AM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
I thought Samsung had started to sandbox their image parsers in recent years, but not sure if that gets used by WhatsApp. Even more impressive if there's a sandbox escape involved too.