FBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,抓住主要信息。 文章开头提到FBI和CISA发布了一个公告,警告公众有关俄罗斯相关的钓鱼攻击。这些攻击的目标是获取消息账户的访问权限。接着,文章提到之前报道过针对Signal和WhatsApp账户的大规模钓鱼活动,目标是高级官员、军事人员、公务员和记者。 然后,FBI和CISA与欧洲情报机构合作,警告同样的策略被用于更广泛的活动,目标是这些商业消息应用。攻击者并没有破解端到端加密,而是通过窃取个人账户访问权限绕过加密。 文章还提到攻击者使用社会工程学手段,诱骗用户分享验证码或PIN码。目标包括美国政府官员、军事人员、政治人物和记者,但同样的技术也可能被用于企业和普通用户。 最后,文章给出了一些保护账户的建议,比如不要轻易分享验证码、使用额外的安全功能等,并提醒如果怀疑账户被劫持该怎么办。 总结一下,主要内容是关于FBI和CISA警告俄罗斯相关的钓鱼攻击,目标是消息应用账户,通过社会工程学手段绕过加密,并提供了一些防护措施。 </think> FBI和CISA警告称,俄罗斯相关钓鱼活动正针对Signal和WhatsApp等消息应用账户展开全球攻击。攻击者通过伪装成“技术支持”诱骗用户分享验证码或PIN码以窃取账户访问权限。建议用户提高警惕,避免泄露敏感信息,并启用额外安全功能以保护账户安全。 2026-3-24 13:39:36 Author: www.malwarebytes.com(查看原文) 阅读量:3 收藏

In a Public Service Announcement (PSA) the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) warn the public about ongoing Russian-linked phishing campaigns that aim to gain access to messaging accounts.

Earlier this month we wrote about a large‑scale phishing campaign aimed at hijacking Signal and WhatsApp accounts belonging to senior officials, military personnel, civil servants, and journalists.

Now the FBI and CISA have joined European intelligence services in warning that the same tactics are being used in a broader campaign targeting these commercial messaging apps. The goal is not to break end‑to‑end encryption, but to walk straight around it by stealing access to individual accounts.

In our previous article, we focused on warnings from the Dutch intelligence services AIVD and MIVD, which described how Russian state‑backed actors approached high‑value targets via Signal and WhatsApp, posing as “Signal Support”, “Signal Security Bot”, or similar. The PSA demonstrates how the same groups are now running global phishing campaigns against messaging app accounts, with evidence suggesting thousands of compromised accounts worldwide.

It’s important to reiterate that the attackers have not managed to break the apps’ end-to-end encryption. Instead, they are relying on social engineering to get a device added so they can eavesdrop on accounts.

The current targets include current and former US government officials, military staff, political figures, and journalists, but there is nothing to stop the same techniques being reused against businesses and everyday users.

So, while it’s tempting to dismiss this as a problem for diplomats and generals (and the agencies issuing these alerts do mention high‑profile targets first), the techniques scale very easily. Once playbooks like these are public, they tend to be copied by cybercriminals looking for new ways to steal money or accounts.

How to protect your accounts

As the PSA puts it:

“Phishing remains one of the most unsophisticated, yet effective means of cyber compromise, often rendering other protections irrelevant”

This calls asks for basic security measures:

  • Treat unsolicited messages from “Support” inside apps as suspicious by default. Legitimate support for apps like Signal and WhatsApp does not ask you, in a chat message, to send back verification codes, PINs, or passwords.​ If you receive a warning about account problems, do not follow links in the message. Open the app’s settings directly or visit the official website through other means.
  • Never share SMS verification codes or app PINs. SMS codes are there to prove that you control a phone number. Anyone who has the code can pretend to be you. App‑specific PINs or passcodes are there to protect account changes. Giving them away is like handing over the keys to your account. Consider anyone asking for them to be a scammer.
  • Be careful what you discuss and with whom. Both the Dutch and US advisories remind us that even with end‑to‑end encryption, some conversations are too sensitive for commercial chat apps.
  • Use the extra security features these apps offer. Enable options like registration lock, registration PIN and device‑change alerts so that your account cannot be silently re‑registered without an extra secret. Store your PIN in a password manager instead of choosing something easy to guess or reusing a common code, to reduce the chance of social engineering or shoulder‑surfing.
  • Another useful feature is disappearing messages. Short‑timer and disappearing messages reduce how much content is available if an attacker gets into a chat later, or if someone obtains long‑term access to a device or backup. They are not a complete solution, but they can limit the damage.

What to do if you think your account was hijacked

If you suspect an attacker has taken over your messaging account:

  1. Try to re‑register your number in the app immediately to kick out other devices.
  2. Revoke all linked devices and change any app‑specific PINs or lock codes.
  3. Warn your contacts that someone may have impersonated you and ask them to treat recent messages with caution.
  4. Review recent conversations for signs of data theft (for example, shared IDs, documents, or passwords that should now be considered exposed).
  5. Report the incident to the app provider and, where appropriate, to national reporting centers such as the FBI’s Internet Crime Complaint Center (IC3) at ic3.gov or the relevant authority in your country.​

The sooner you act, the smaller the window in which attackers can exploit your account.


We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/03/fbi-cisa-warn-of-russian-hackers-hijacking-signal-and-whatsapp-accounts
如有侵权请联系:admin#unsafe.sh