Application security, Phishing, Threat Intelligence

Signal app exploited in Russian cyberespionage

The Signal logo seen displayed on a smartphone screen with the logos of Whatsapp and Telegram in the background.
A group of 40 press and digital rights groups are calling on democracies around the world to embrace strong encryption policies they say are necessary to preserve privacy and security in the digital age. (Photo Illustration by Rafael Hen...

Numerous Russian state-backed advanced persistent threat groups have been targeting the encrypted messaging app Signal's "linked devices" feature to circumvent the app's end-to-end encryption capabilities and facilitate cyberespionage efforts, according to SecurityWeek.

Malicious device-linking QR codes have not only been added to phishing pages or spread via group invite links but also leveraged in close-access attacks, as conducted by the Sandworm operation, a report from Mandiant revealed. Intrusions involving a Signal phishing kit spoofing the Ukrainian military's Kropyva app have also been deployed by another Russian threat group to compromise Ukrainian military-owned Signal accounts. Such a phishing kit was discovered to include a JavaScript payload enabling user information and geolocation data compromise, noted the report, which urged the implementation of more stringent security measures among Signal users. "...[T]his threat also extends to other popular messaging applications such as WhatsApp and Telegram, which are also being actively targeted by Russian-aligned threat groups using similar techniques," said Mandiant researcher Dan Black.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds