Overview
Google Threat Intelligence Group (GTIG) has identified multiple Russia-aligned threat actors actively targeting Signal Messenger accounts as part of a multi-year cyber espionage operation. The campaign, likely driven by Russia\'s intelligence-gathering objectives during its invasion of Ukraine, aims to compromise the secure communications of military personnel, politicians, journalists, and activists.
The tactics observed in this campaign include phishing attacks abusing Signal\'s linked devices feature, malicious JavaScript payloads and malware designed to steal Signal messages from compromised Android and Windows devices. While the focus remains on Ukrainian targets, the threat is expected to expand globally as adversaries refine their techniques.
Google has partnered with Signal to introduce security enhancements that mitigate these attack vectors, urging users to update to the latest versions of the app.
Tactics Used to Compromise Signal Accounts
Exploiting Signal\'s "Linked Devices" Feature
Russia-aligned threat actors have manipulated Signal\'s legitimate linked devices functionality to gain persistent access to victim accounts. By tricking users into scanning malicious QR codes, attackers can link an actor-controlled device to the victim\'s account, enabling real-time message interception without full device compromise.
The phishing methods used to deliver these malicious QR codes include:
Fake Signal group invites containing altered JavaScript redirects.
Phishing pages masquerading as Ukrainian military applications.
Notes
★★
Envoyé
Oui
Condensat
$resfile $zipfile $zipfile /s 0185 0195 1024x512 107 133 138 150 158 175 194:18000 45 249 2fa 300x150 47 155 47 87 8wkmzwam about abusing access account accounts accounts actively activists activity actor actors add addresses adopt adopting adversaries adversary against aim aims alerts aligned allows also altered altering android any app appdata applications apps apps apt44 apt44: archive are army artillery assist attack attacker attackers attacks attacks attributed audit authentication avoid based bat batch battlefield becoming been before belarus benefits best biometric blizzard build building built but called campaign campaigns can capable caption= captured center cert challenge characters chisel clicking cluster code codes codes collaboration collects com/blog/topics/threat com/fake com/wp command: common communications complex components compresses compromise compromised com com signal conclusion conference config confirm connections constantly contacts containing content/uploads/2025/02/signal controlled copy countering countries country create critical custom cyber cyberattacks cyberspace data database defensehttps://thecyberexpress defenses deliver designed desktops destination destinationpath detected: detection device devices devices” disguised document domain domains doredirect driven during e078778b62796bab2d7ab2b04d6b01bf a97a28276e4f88134561d938f60db495 b27ff24870d93d651ee1d8e06276fa98 ecosystem effective efforts employ enable enabling enhancements erase escalation espionage evade evolving exchanging exe executes exfiltrate exfiltrating exfiltration exfiltration expand expected experience expertise explained exploiting exploits extract factor fake feature feature file= file=c: files focus following force frameworks from fsb full function functionality gain gathering genuine geolocation getelementbyid global globally google gov group groups growing gtig guidance hardware has hashes have head high hosting host host teneta href https://cloud https://cyble identified identified: compress identify image implement incidents include include: includes: includes: including including: indicators information infrastructure install instance instead intelligence intelligence/russia interception introduce invasion invites invites iocs ios iphone item its javascript journalists json jtueod key key= keys kits kits known kropyva large later latest leading legitimate leveraged leveraging lightweight likely link linked linking links local location lock lockdown log login logs long malicious malware malware manipulated many masquerading measures measures: medium message messages messaging messenger messengerhttps://cert methods military mimic mitigate mitigation mixed mode modern mode modifications multi multiple munich must nationshttps://cip navigate new not now nqyg nul c: number objectives observed oleksandr one online only operation organizations other overlaps overview page pages pages part partnered partners passwords passwords patches path payload payloads persistent personnel phishing physical pinpoint platforms politicians post potential potii powershell practices pragma prevent prevention priority proactive professionals programdata protect protecting public query quickly rclog rclone real receive recent recover recursively redirect redirects reduces references: refine regularly relationships remain remains remote remove replace represents rerouted responding response risk roaming robocopy robust russia russian safeguard said sandworm scan scanning screen script scripts search seashell secure security sensitive server sgnl://linkdevice share shared should signa signal significant site site signal site teneta sources specifically spoofed sqlcipher ssscip stage steal storage strategies strategies strengthen strong surface surveillance suspicious symbols system tactics t
Tags
Malware
Tool
Vulnerability
Threat
Mobile
Cloud
Conference
Written by: Dan Black
Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia\'s intelligence services. While this emerging operational interest has likely been sparked by wartime demands to gain access to sensitive government and military communications in the context of Russia\'s re-invasion of Ukraine, we anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war.
Signal\'s popularity among common targets of surveillance and espionage activity-such as military personnel, politicians, journalists, activists, and other at-risk communities-has positioned the secure messaging application as a high-value target for adversaries seeking to intercept sensitive information that could fulfil a range of different intelligence requirements. More broadly, this threat also extends to other popular messaging applications such as WhatsApp and Telegram, which are also being actively targeted by Russian-aligned threat groups using similar techniques. In anticipation of a wider adoption of similar tradecraft by other threat actors, we are issuing a public warning regarding the tactics and methods used to date to help build public awareness and help communities better safeguard themselves from similar threats.
We are grateful to the team at Signal for their close partnership in investigating this activity. The latest Signal releases on Android and iOS contain hardened features designed to help protect against similar phishing campaigns in the future. Update to the latest version to enable these features.
Phishing Campaigns Abusing Signal\'s "Linked Devices" Feature
The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app\'s legitimate "linked devices" feature that enables Signal to be used on multiple devices concurrently. Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim\'s account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim\'s secure conversations without the need for full-device compromise.