Germany warns of state-linked phishing campaign targeting journalists, government officials
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在一百个字以内,不需要特定的开头,直接写描述。 首先,我需要快速浏览文章内容。文章主要讲德国当局警告说,有国家支持的威胁行为者利用Signal等即时通讯应用攻击欧洲的高层政治、军事和外交人物以及调查记者。攻击手段主要是社会工程学,而非恶意软件或漏洞。攻击者伪装成官方支持团队或聊天机器人,诱骗受害者分享安全码或验证码,从而接管账户。此外,他们还利用设备连接功能,让受害者扫描二维码,将账户链接到攻击者的设备上。Signal因其在军政界和记者中的普及而成为高价值目标。 接下来,我需要提取关键信息:德国警告、国家支持的威胁、Signal等应用、高层人士为目标、社会工程学手段、伪装成官方团队诱骗信息、利用设备连接功能、Signal作为高价值目标。 然后,我要把这些信息浓缩成100字以内的中文描述。注意不要使用“文章内容总结”之类的开头。 可能的结构:德国警告国家支持的威胁利用Signal等应用攻击高层人士和记者,通过社会工程学手段获取账户信息或连接设备。 检查是否遗漏重要点:没有提到其他平台如WhatsApp?但用户要求控制在100字内,可能需要简化。 最终总结:德国警告国家支持的威胁利用Signal等即时通讯应用攻击欧洲高层政治、军事和外交官员及记者。攻击者通过伪装成官方团队或利用设备连接功能获取账户信息或持续访问。 这样应该符合用户的要求。 </think> 德国警告国家支持的威胁行为者正利用Signal等即时通讯应用攻击欧洲高层政治、军事和外交官员及记者。攻击者通过伪装成官方团队或利用设备连接功能获取账户信息或持续访问。 2026-2-10 14:31:19 Author: therecord.media(查看原文) 阅读量:1 收藏

German authorities are warning that a suspected state-controlled threat actor is using messaging apps such as Signal to target senior political, military and diplomatic figures, as well as investigative journalists, across Europe.

In a joint advisory issued late last week, Germany’s domestic intelligence agency (BfV) and federal cybersecurity office (BSI) said attackers are attempting to gain access to private messaging accounts in order to monitor confidential communications and potentially compromise broader networks.

Officials said the campaign relies on social engineering rather than malware or software vulnerabilities, exploiting legitimate security features built into messaging platforms. The current activity is focused on Signal, authorities said, but similar methods could be used against other messaging platforms with comparable features, including WhatsApp.

Germany has not attributed this campaign to a specific threat actor but said the techniques used in the latest attacks could be replicated by both state-backed hackers and cybercriminals.

“Given the high-profile target set, current known cases are likely attributable to a state-controlled cyber actor,” the advisory said.

Primary attack methods

Authorities identified two main attack variants. In one of them, the hackers impersonate official support teams or automated chatbots and contact targets directly through messaging apps. The messages often begin with an urgent security warning that claims private data could be lost without immediate action.

Victims are then asked to share account security PINs or SMS verification codes, allowing attackers to register the account on a device they control and take over communications.

In another variant, attackers abuse legitimate device-linking features that allow users to connect messaging accounts to additional devices. Victims are persuaded to scan a QR code, which instead links the victim’s account to a device controlled by the attacker, enabling ongoing access to contact lists, recent message history and future communications.

Popular espionage tool

Security researchers have previously warned that Signal’s widespread adoption among military personnel, government officials, journalists and activists has made it a high-value target for espionage operations.

Ukrainian state officials said Russian state-backed hackers were targeting Signal messenger accounts — including those used by Ukrainian military personnel and government officials — in an effort to access sensitive information that could aid Moscow’s war effort.

Researchers at Google also discovered a campaign in which the notorious Russian threat actor Sandworm assisted Russian military forces in linking Signal accounts from captured battlefield devices to their own systems for further exploitation.

Signal did not respond to a request for comment.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/germany-warns-phishing-campaign-signal-gov-officials-journalists
如有侵权请联系:admin#unsafe.sh