2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
German security experts warn that state-backed hackers are using social engineering tactics to infiltrate the Signal messaging app of military leaders and journalists. They trick victims into revealing security codes or scanning malicious QR codes, allowing the attackers to access private conversations without detection.
If you do, here's more
Security experts in Germany are raising alarms about a surge in digital attacks targeting high-ranking officials, including military leaders and diplomats. The Federal Office for Information Security (BSI) and the Federal Office for the Protection of the Constitution (BfV) report that state-backed hackers are employing social engineering tactics rather than traditional malware. These attackers exploit the Signal messaging app's features to access private conversations without detection.
One common tactic involves impersonating Signal's security support team. Hackers send messages that look legitimate, claiming there’s been a security breach. They pressure victims to verify their accounts by providing a six-digit Security PIN or an SMS code. Once hackers obtain this information, they can take control of the victim's account, allowing them to send messages as if they were the user, potentially spreading false information in group chats.
Another method involves the use of QR codes. Attackers approach targets with convincing stories, asking them to scan a QR code that appears harmless. However, this action links the attacker’s device to the victim’s Signal account, granting access to the last 45 days of chat history and new incoming messages. To protect against these threats, experts recommend ignoring unsolicited messages from support, checking for unrecognized linked devices in Signal settings, and enabling the Registration Lock feature to prevent account takeovers.
Questions about this article
No questions yet.