Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Axiom Space is preparing for its fourth mission to the ISS

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Hackers exploit signal linked device features to hijack accounts via malicious QR codes
Identity

Hackers exploit signal linked device features to hijack accounts via malicious QR codes

userBy userFebruary 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 19, 2025Ravi LakshmananMobile Security/Cyber ​​Spy

Multiple Russian-linked threat actors have been observed targeting interested individuals via privacy-focused messaging app signals, gaining unauthorized access to accounts.

“The most novel and widely used technique supporting Russia’s aligned attempts to compromise signal accounts is the misuse of the app’s legal “linked device” feature, which uses signals simultaneously on multiple devices. I’ll make it possible” in the report.

In the attack discovered by Tech Giant’s threat intelligence team, threat actors, including those tracking as UNC5792, enter a malicious QR code that links the victim’s account to an actor-controlled signal instance when scanned. I relied on it.

As a result, future messages will be delivered in real time sync to both victims and threat actors, giving threat actors a permanent way to eavesdrop on victim conversations. Google said UAC-0195 overlaps partially with the hacking group known as UAC-0195.

Cybersecurity

These QR codes are known to be spoofed as group invitations, security alerts, or legal device pairing procedures from the Signal website. Alternatively, it is known that malicious device link QR codes are embedded in phishing pages that claim to be a specialized application used by the Ukrainian military.

“UNC5792 hosts a modified signal group invitation on the actor control infrastructure, designed to look identical to the legitimate signal group invitation,” Google says.

Another threat actor linked to signal targeting is UNC4221 (aka UAC-0185). It targets signal accounts used by Ukrainian military personnel, using custom phishing kits designed to mimic certain aspects of the Kropyva application used by the military. Ukraine for artillery guidance.

It also uses PinPoint, known as a lightweight JavaScript payload, which allows you to collect basic user information and geolocation data through phishing pages.

Apart from UNC5792 and UNC4221, some of the other hostile populations that trained their vision on the signal are sandworms (aka APT44) that utilize a Windows batch script named Wavesign. Turla operates lightweight PowerShell scripts. and UNC1151 use the Robocopy utility to remove signal messages from infected desktops.

A disclosure from Google has been a month since the Microsoft Threat Intelligence team attributed a Russian threat actor known as Star Blizzard to a spear phishing campaign that utilizes similar device linking capabilities for WhatsApp accounts .

Last week, Microsoft and Volexity have launched a technique called device code phishing for multiple Russian threat actors to log in to victim accounts by targeting them through messaging apps such as WhatsApp, Signal, and Microsoft teams. It has been revealed that it is being used.

“Operational emphasis on signals from multiple threat actors over the past few months serves as a key warning against growing threats to ensure messaging applications that are sure to intensify in the short term,” Google said. I said that.

Cybersecurity

“This threat to protect messaging applications is not limited to remote cyber operations such as phishing and malware delivery, as reflected in the broader efforts to compromise signal accounts, but threat actors can easily make it easier for them to do so. It also includes close access operations that can be accessed: Unlocked devices on the target.

This disclosure uses fake download pages to disguise popular applications such as Signal, Line, Gmail, Google Translation, and deliver background executables targeting Chinese-speaking users. It also follows the discovery of a new Search Engine Optimization (SEO) addiction campaign that uses download pages.

“Executables delivered via fake download pages follow a consistent execution pattern, including temporary file extraction, process injection, security changes, and network communication,” Hunt.io said, and samples. shows infosealer-like functionality associated with malware strains called. Microcrap.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAI startup Baseten raises $75 million to eliminate AI inference bottlenecks and accelerate adoption
Next Article Silent seminars are expanding globally with wireless technology
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Axiom Space is preparing for its fourth mission to the ISS

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.