Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

FBI Unveils Warning: Russian Intelligence Behind Signal Phishing Campaigns Targeting High-Value Individuals


The FBI has linked Signal phishing attacks to Russian intelligence services, warning users of thousands of compromised accounts. The campaigns target high-intelligence-value individuals and use account hijacking tactics to bypass end-to-end encryption.

  • The FBI has issued a public service announcement warning users of encrypted messaging apps like Signal and WhatsApp about phishing campaigns linked to Russian intelligence services.
  • The attacks aim to bypass end-to-end encryption by hijacking accounts, allowing attackers to read private messages, impersonate victims, and launch further phishing campaigns.
  • Most phishing messages impersonate support accounts, requesting users to perform actions that grant threat actors access to their accounts.
  • The FBI advises users to remain suspicious of unexpected messages, be wary of QR code scans, and never share verification codes with anyone.
  • Thousands of messaging accounts have been compromised, and the campaign has already led to unauthorized access to sensitive information.
  • Russian intelligence services are reportedly targeting high-value individuals, such as government officials, military personnel, and journalists.


  • The Federal Bureau of Investigation (FBI) has issued a public service announcement (PSA) alerting users of encrypted messaging apps such as Signal and WhatsApp to the threat of phishing campaigns linked to Russian intelligence services. The warning comes after thousands of accounts have been compromised, with attackers gaining unauthorized access to sensitive information and impersonating victims.

    According to the FBI's PSA, the phishing attacks are designed to bypass the protections of end-to-end encryption in commercial messaging apps (CMAs), not by breaking encryption, but through account hijacks. This tactic allows threat actors to read private messages and contact lists, impersonate victims, and launch additional phishing campaigns as trusted people.

    The FBI states that the techniques used in these attacks can be applied to multiple CMAs but predominantly target Signal users. The campaign's focus on high-intelligence-value individuals, such as current and former U.S. government officials, military personnel, political figures, and journalists, suggests a deliberate effort by Russian intelligence services to target those with access to sensitive information.

    The FBI's attribution of the phishing attacks to Russian intelligence services is significant, as it marks the first time these agencies have been directly linked to such operations. The warning from Dutch cybersecurity authorities earlier this month that described similar account-hijacking operations further solidifies the connection between Russian intelligence and these phishing campaigns.

    France's Cyber Crisis Coordination Center (C4) has also published an alert about the same tactics targeting instant messaging platforms, stating the activity is widespread and ongoing across multiple countries. The FBI's PSA emphasizes that encryption in Signal, WhatsApp, and similar platforms is not broken and no vulnerabilities are being exploited.

    The FBI says that most phishing messages impersonate support accounts, which request that the target perform an action that secretly grants threat actors access to the account. Victims are typically tricked into sharing verification codes or scanning malicious QR codes that link their accounts (Signal and WhatsApp) to attacker-controlled devices.

    Once the threat actors gain access to accounts, they can silently monitor communications, join group chats, and send messages as the compromised user, making detection more difficult and enabling further phishing campaigns. The FBI advises users to remain suspicious of unexpected messages, be wary of requests to scan QR codes or link devices to their accounts, and never share verification codes with anyone, including accounts claiming to be a platform's support personnel.

    The campaign has already led to unauthorized access to thousands of messaging accounts, which were then used to target additional victims. The FBI's warning serves as a reminder for users to stay vigilant and take necessary precautions to protect themselves against these types of phishing attacks.

    In light of this new information, it is essential to understand the tactics used by Russian intelligence services in their phishing campaigns and how they can be prevented. By being aware of the techniques employed by attackers and taking proactive measures to secure our online communications, we can reduce the risk of falling victim to such phishing attacks.

    The implications of this warning extend beyond individual users, as it highlights the importance of robust cybersecurity measures for organizations and governments. The FBI's attribution of these phishing campaigns to Russian intelligence services underscores the need for collective action to address this threat.

    In conclusion, the FBI's public service announcement serves as a timely reminder of the ongoing threats posed by Russian intelligence services through phishing campaigns targeting high-value individuals. By understanding the tactics employed by attackers and taking proactive steps to secure our online communications, we can mitigate the risk of falling victim to these types of attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/FBI-Unveils-Warning-Russian-Intelligence-Behind-Signal-Phishing-Campaigns-Targeting-High-Value-Individuals-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/

  • https://www.ic3.gov/PSA/2026/PSA260320

  • https://www.reuters.com/technology/cyber-actors-linked-russia-are-targeting-users-commercial-messaging-apps-fbi-2026-03-20/

  • https://www.fortinet.com/resources/cyberglossary/advanced-persistent-threat

  • https://asec.ahnlab.com/en/88063/


  • Published: Fri Mar 20 16:12:03 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us