FBI links Signal phishing attacks to Russian intelligence services
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是FBI发布警告,说俄罗斯情报机构通过钓鱼攻击 targeting 使用Signal和WhatsApp的用户。攻击手段是通过劫持账户,而不是破解加密。受害者包括政府官员、军方、政治人物和记者。FBI建议用户提高警惕。 接下来,我需要把这些要点浓缩到100字以内。要确保涵盖FBI的警告、攻击者身份、目标人群、攻击方式以及建议措施。 可能的结构是:FBI警告俄罗斯情报机构利用钓鱼攻击劫持Signal和WhatsApp账户,目标是高价值人士,如政府官员等。用户需警惕异常信息和分享验证码的要求。 检查一下字数,确保不超过限制。同时,语言要简洁明了,不使用复杂的术语。 最后,确认总结是否准确传达了原文的关键信息,并且符合用户的要求。 </think> FBI警告称俄罗斯情报机构通过钓鱼攻击劫持Signal和WhatsApp账户,目标为高价值人士如政府官员等。攻击者通过获取验证码或恶意二维码控制账户,进而窃取隐私并发起进一步攻击。用户需警惕异常请求并保护验证码。 2026-3-20 20:47:27 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

Signal

The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encrypted messaging apps such as Signal and WhatsApp in phishing campaigns that have already compromised thousands of accounts.

The FBI's PSA is the first public attribution linking these campaigns directly to Russian intelligence services, rather than a broader description of just state hackers.

According to the FBI, the campaigns are designed to bypass the protections of end-to-end encryption in commercial messaging apps (CMAs), not by breaking encryption, but through account hijacks.

The FBI says the techniques used in these attacks can be applied to multiple CMAs but predominantly target Signal users.

Depending on the access they obtain, attackers can read private messages and contact lists, impersonate victims, and launch additional phishing campaigns as trusted people.

The FBI says the attacks have affected "thousands" of accounts worldwide and primarily target those with access to sensitive information.

"The activity targets individuals of high intelligence value, such as current and former U.S. government officials, military personnel, political figures, and journalists," reads the FBI's PSA.

The FBI's attribution comes after earlier advisories from Dutch and French cybersecurity authorities that described similar account-hijacking operations.

Earlier this month, Dutch intelligence agencies warned that state-backed attackers were targeting Signal and WhatsApp users in phishing campaigns aimed at gaining access to secure communications.

The advisory highlighted that the attacks relied on tricking users into allowing attackers to add the account to their devices or link attacker-controlled devices to the account.

Today, France's Cyber Crisis Coordination Center (C4) also published an alert about the same tactics targeting instant messaging platforms, stating the activity is widespread and ongoing across multiple countries.

Signal phishing attacks

All three advisories state that the phishing attacks follow the same tactic of bypassing the platform's encryption by hijacking accounts or linking devices to an existing account.

Two different phishing methods seen targeting Signal
Two different phishing methods seen targeting Signal
Source: FBI

The FBI says that most phishing messages impersonate support accounts, which request that the target perform an action that secretly grants threat actors access to the account.

Victims are typically tricked into sharing verification codes or scanning malicious QR codes that link their accounts (Signal and WhatsApp) to attacker-controlled devices.

Samples of Signal phishing messages used in the phishing campaign
Samples of Signal phishing messages used in the phishing campaign
Source: France’s Cyber Crisis Coordination Center (C4) 

Once the threat actors gain access to accounts, they can silently monitor communications, join group chats, and send messages as the compromised user, making detection more difficult and enabling further phishing campaigns.

The PSA emphasizes that encryption in Signal, WhatsApp, and similar platforms is not broken and no vulnerabilities are being exploited.

The FBI says the campaign has already led to unauthorized access to thousands of messaging accounts, which were then used to target additional victims.

Users are advised to remain suspicious of unexpected messages, be wary of requests to scan QR codes or link devices to their accounts, and never share verification codes with anyone, including accounts claiming to be a platform's support personnel.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/
如有侵权请联系:admin#unsafe.sh