Kremlin hackers attempting to compromise Signal, WhatsApp accounts globally
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。文章讲的是荷兰情报部门警告说,俄罗斯的国家黑客正在进行全球行动,攻击Signal和WhatsApp账户,目标是政府官员和军方人员。这些攻击利用了应用的安全功能和社会工程手段,比如伪装成客服获取验证码。 接下来,我需要将这些信息浓缩到100字以内。要注意不要使用“文章内容总结”这样的开头,直接描述内容。关键点包括:俄罗斯黑客、全球行动、攻击Signal和WhatsApp、目标人群、攻击方法(伪装客服、获取验证码)、应用的安全性依赖设备安全。 然后,我要确保语言简洁明了,不遗漏重要信息。可能的结构是:首先说明事件和目标,接着描述攻击手段,最后提到应用的安全依赖设备安全。 最后检查字数是否在限制内,并确保表达清晰准确。 </think> 俄罗斯国家黑客正针对政府官员和军方人员的Signal和WhatsApp账户发起全球攻击。荷兰情报机构警告称,这些攻击利用应用的安全功能和社会工程手段获取验证码或PIN码以控制账户。尽管Signal和WhatsApp采用端到端加密技术保护消息内容,但若设备或账户被攻破,消息仍可被读取。 2026-3-9 15:17:7 Author: therecord.media(查看原文) 阅读量:0 收藏

Russian state hackers are carrying out a global campaign to compromise Signal and WhatsApp accounts belonging to government officials and military personnel, Dutch intelligence warned Monday.

In a public cybersecurity advisory, the Netherlands’ military intelligence service (MIVD) and domestic security agency (AIVD) said the operation is targeting dignitaries, civil servants and members of the armed forces.

Dutch government employees are among those whose accounts have already been compromised, the agencies said. They warned the campaign could also target journalists and others of interest to the Russian government.

The warning follows a series of Russian espionage campaigns uncovered by Western intelligence agencies targeting NATO governments, researchers and defense contractors.

The agencies stressed the attacks target individual accounts and do not indicate any breach of the messaging platforms themselves.

Signal and WhatsApp both use the Signal Protocol, an end-to-end encryption system widely regarded as the strongest available for protecting message content in transit. However, messages remain readable if an attacker gains access to a user’s device or account.

“It is not the case that Signal or WhatsApp as a whole have been compromised,” AIVD Director-General Simone Smit said in a statement. “Individual user accounts are being targeted.”

The advisory does not estimate how many victims there are and does not attribute the activity to a specific Russian intelligence agency or known hacking group. Instead of exploiting technical flaws, the campaign abuses legitimate security features in the apps and relies on social engineering, the agencies said.

Attackers typically impersonate customer support accounts and try to trick victims into sharing verification codes or PIN numbers needed to access their messaging accounts.

The hackers can trigger those codes by starting the normal registration process using the target’s phone number. Signal and WhatsApp automatically send a verification code to any number entered during account registration.

Posing as support staff, the attackers then claim the victim must share the code to secure or verify their account. If the victim provides it, the attacker can enter the code on their own device and take control of the account, allowing them to read messages and send messages while impersonating the victim.

Another method involves persuading users to scan malicious QR codes or click links that connect a hacker’s device to the victim’s account through the apps’ “linked devices” feature, giving attackers access to chats and message history.

The campaign builds on Russian cyber operations that have previously targeted messaging platforms used by officials, journalists and military personnel.

Google security researchers warned last year that Signal’s widespread use among Ukrainian soldiers, politicians and journalists had made it a frequent target for Russian espionage operations.

In one case, Russian military hackers linked Signal accounts from captured battlefield devices to their own systems for further exploitation.

The Dutch agencies warned users never to share verification codes, avoid scanning unknown QR codes and ignore messages claiming to be from Signal support.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and a fellow at the European Cyber Conflict Research Initiative, now Virtual Routes. He can be reached securely using Signal on: AlexanderMartin.79


文章来源: https://therecord.media/russian-hackers-target-signal-whatsapp-warn-dutch-intelligence-agencies
如有侵权请联系:admin#unsafe.sh