Home OSINT News Signals
CYBER

FBI and CISA Alert: Russian-Aligned Hackers Phishing for Signal and WhatsApp Account Takeovers

🕓 2 min read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint cybersecurity advisory warning of an ongoing, sophisticated phishing campaign. The operation, attributed to threat actors affiliated with Russian Intelligence Services, specifically targets users of commercial messaging applications (CMAs) like WhatsApp and Signal. The primary objective is to seize control of accounts belonging to individuals deemed to have high intelligence value, including current and former U.S. government officials, military personnel, political figures, and journalists. FBI Director Kash Patel emphasized the global scale of the compromise, stating that the campaign has already resulted in unauthorized access to thousands of individual accounts globally.

The attack methodology is notably focused on credential theft rather than exploiting technical vulnerabilities within the encrypted messaging platforms themselves. Hackers deploy tailored phishing messages, often impersonating trusted contacts or services, to trick targets into revealing their two-factor authentication (2FA) codes or session credentials. Once these credentials are obtained, the threat actors gain full access to the victim's account. This access allows them to view entire message histories and contact lists, send messages from the victim's trusted identity to conduct further phishing, and potentially exfiltrate sensitive information. The integrity of Signal's and WhatsApp's end-to-end encryption remains intact; the breach occurs at the account level by compromising user credentials.

While the U.S. advisory did not name a specific group, industry intelligence provides context. Prior reports from Microsoft and Google's Threat Intelligence Group have linked similar campaigns to Russia-aligned threat clusters tracked under names like Star Blizzard, UNC5792 (also known as UAC-0195), and UNC4221 (UAC-0185). These groups are known for conducting highly targeted "spear-phishing" operations, often for espionage purposes. The alert aligns with a separate warning from France's National Cybersecurity Agency (ANSSI), whose Cyber Crisis Coordination Center (C4) noted a surge in attacks targeting the instant messaging accounts of government officials, journalists, and business leaders.

The strategic end goal of this campaign is multifaceted, extending beyond simple data theft. By controlling these high-value accounts, the threat actors can conduct persistent, trusted impersonation to gather intelligence, manipulate information, and launch secondary attacks within professional and diplomatic circles. The incident underscores a critical cybersecurity principle: even the most secure encryption is powerless against a compromised endpoint or stolen login credentials. It serves as a stark reminder for all users, especially those in sensitive positions, to maintain extreme vigilance against phishing attempts, enable all available security features like registration lock, and verify unusual requests through a separate communication channel.

Telegram X LinkedIn
Back to News