Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit signal linked device features to hijack accounts via malicious QR codes
Identity

Hackers exploit signal linked device features to hijack accounts via malicious QR codes

userBy userFebruary 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 19, 2025Ravi LakshmananMobile Security/Cyber ​​Spy

Multiple Russian-linked threat actors have been observed targeting interested individuals via privacy-focused messaging app signals, gaining unauthorized access to accounts.

“The most novel and widely used technique supporting Russia’s aligned attempts to compromise signal accounts is the misuse of the app’s legal “linked device” feature, which uses signals simultaneously on multiple devices. I’ll make it possible” in the report.

In the attack discovered by Tech Giant’s threat intelligence team, threat actors, including those tracking as UNC5792, enter a malicious QR code that links the victim’s account to an actor-controlled signal instance when scanned. I relied on it.

As a result, future messages will be delivered in real time sync to both victims and threat actors, giving threat actors a permanent way to eavesdrop on victim conversations. Google said UAC-0195 overlaps partially with the hacking group known as UAC-0195.

Cybersecurity

These QR codes are known to be spoofed as group invitations, security alerts, or legal device pairing procedures from the Signal website. Alternatively, it is known that malicious device link QR codes are embedded in phishing pages that claim to be a specialized application used by the Ukrainian military.

“UNC5792 hosts a modified signal group invitation on the actor control infrastructure, designed to look identical to the legitimate signal group invitation,” Google says.

Another threat actor linked to signal targeting is UNC4221 (aka UAC-0185). It targets signal accounts used by Ukrainian military personnel, using custom phishing kits designed to mimic certain aspects of the Kropyva application used by the military. Ukraine for artillery guidance.

It also uses PinPoint, known as a lightweight JavaScript payload, which allows you to collect basic user information and geolocation data through phishing pages.

Apart from UNC5792 and UNC4221, some of the other hostile populations that trained their vision on the signal are sandworms (aka APT44) that utilize a Windows batch script named Wavesign. Turla operates lightweight PowerShell scripts. and UNC1151 use the Robocopy utility to remove signal messages from infected desktops.

A disclosure from Google has been a month since the Microsoft Threat Intelligence team attributed a Russian threat actor known as Star Blizzard to a spear phishing campaign that utilizes similar device linking capabilities for WhatsApp accounts .

Last week, Microsoft and Volexity have launched a technique called device code phishing for multiple Russian threat actors to log in to victim accounts by targeting them through messaging apps such as WhatsApp, Signal, and Microsoft teams. It has been revealed that it is being used.

“Operational emphasis on signals from multiple threat actors over the past few months serves as a key warning against growing threats to ensure messaging applications that are sure to intensify in the short term,” Google said. I said that.

Cybersecurity

“This threat to protect messaging applications is not limited to remote cyber operations such as phishing and malware delivery, as reflected in the broader efforts to compromise signal accounts, but threat actors can easily make it easier for them to do so. It also includes close access operations that can be accessed: Unlocked devices on the target.

This disclosure uses fake download pages to disguise popular applications such as Signal, Line, Gmail, Google Translation, and deliver background executables targeting Chinese-speaking users. It also follows the discovery of a new Search Engine Optimization (SEO) addiction campaign that uses download pages.

“Executables delivered via fake download pages follow a consistent execution pattern, including temporary file extraction, process injection, security changes, and network communication,” Hunt.io said, and samples. shows infosealer-like functionality associated with malware strains called. Microcrap.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAI startup Baseten raises $75 million to eliminate AI inference bottlenecks and accelerate adoption
Next Article Silent seminars are expanding globally with wireless technology
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.