Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists
Identity

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

userBy userFebruary 7, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The German Federal Office for the Protection of the Constitution (also known as the Bundesamt für Verfassungsschutz or BfV) and the Federal Office for Information Security (BSI) have issued a joint advisory warning about a malicious cyber campaign carried out by a likely state-sponsored threat actor, including carrying out phishing attacks against the Signal messaging app.

“The focus is on investigative journalists in Germany and Europe, as well as high-level political, military and diplomatic targets,” the agency said. “Unauthorized access to your Messenger account can not only grant access to sensitive private communications, but can put your entire network at risk.”

What’s notable about this campaign is that it does not involve distributing malware or exploiting security vulnerabilities in privacy-focused messaging platforms. Rather, the end goal is to use its legitimate capabilities as a weapon to gain covert access to the victim’s chats and their contact list.

The attack chain is as follows: The attackers pose as support chatbots named “Signal Support” or “Signal Security ChatBot” and initiate direct contact with potential targets, prompting them to provide a PIN or verification code received via SMS or face the risk of data loss.

If the victim complies, the attacker can register an account and gain access to the victim’s profile, settings, contacts, and blocklists through a controlled device or mobile number. Although a stolen PIN does not provide access to a victim’s past conversations, a threat actor could use it to capture incoming messages and send messages impersonating the victim.

Once a target user loses access to their account, the attacker poses as a support chatbot and instructs them to register a new account.

There is also another infection sequence that leverages the link option on the device to trick the victim into scanning a QR code, thereby granting access to the victim’s account (including messages from the past 45 days) on the attacker-controlled device.

However, in this case, targeted individuals still have access to their accounts, but little do they realize that their chats and contact lists are also exposed to threat actors.

Security officials warned that while Signal appears to be the focus of the current attack, the attack could extend to WhatsApp as it also includes similar device link and PIN functionality as part of two-factor authentication.

“Successful access to a messenger account not only allows the viewing of sensitive personal communications, but also the possibility of compromising the entire network via group chats,” the BfV and BSI said.

It’s unclear who is behind this activity, but a Microsoft and Google Threat Intelligence Group report early last year said similar attacks were orchestrated by multiple Russian-aligned threat clusters tracked as Star Blizzard, UNC5792 (aka UAC-0195), and UNC4221 (aka UAC-0185).

In December 2025, Gen Digital also detailed another campaign codenamed GhostPairing. In this campaign, cybercriminals can use WhatsApp’s device linking feature to take control of your account and impersonate you or commit fraud.

To stay protected from threats, we recommend that users don’t access their support account or enter their Signal PIN as a text message. A key line of defense is to enable a registration lock that prevents unauthorized users from registering your phone number on another device. We also recommend that you regularly check the list of linked devices and remove unknown devices.

The development comes as Norway’s government accuses Chinese-backed hacking groups, including Salt Typhoon, of exploiting vulnerable network equipment to infiltrate multiple organizations in the country, while Russia closely monitors military targets and the activities of its allies, and accuses Iran of monitoring dissidents.

The Norwegian Police Security Service (PST) said that Chinese intelligence services are trying to recruit Norwegian nationals to gain access to sensitive data, noting that it is encouraging these sources to build their own network of “human sources” by advertising part-time jobs on job boards or approaching them via LinkedIn.

The agency also warned that China is “systematically” using joint research and development efforts to strengthen its security and intelligence capabilities. Note that Chinese law requires software vulnerabilities identified by Chinese researchers to be reported to authorities within two days of discovery.

“Iranian cyberattackers are compromising dissident email accounts, social media profiles, and personal computers and gathering information about dissidents and their networks,” PST said. “These threat actors are highly capable and will continue to develop techniques to carry out increasingly targeted and intrusive operations against individuals in Norway.”

The disclosure follows a recommendation from CERT Polska, which assessed that a Russian state hacking group called Static Tundra was likely behind a coordinated cyber attack targeting more than 30 wind and solar farms, private companies in the manufacturing sector, and large combined heat and power plants (CHPs) that provide heat to about 500,000 customers in the country.

“Each affected facility had a FortiGate device that acted as both a VPN concentrator and firewall,” the report said. “In both cases, the VPN interface was exposed to the Internet and allowed authentication to accounts defined in the configuration without multi-factor authentication.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBenchmark raises $225 million in special funding to double Cerebras
user
  • Website

Related Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.