Active Spyware Campaigns Targeting High-Value Signal and WhatsApp Users
Summary
Hide ▲
Show ▼
Germany's Federal Office for the Protection of the Constitution (BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. The focus is on high-ranking targets in politics, the military, and diplomacy, as well as investigative journalists in Germany and Europe. Unauthorized access to messenger accounts not only allows access to confidential private communications but also potentially compromises entire networks. The campaign involves threat actors masquerading as 'Signal Support' or a support chatbot named 'Signal Security ChatBot' to initiate direct contact with prospective targets, urging them to provide a PIN or verification code received via SMS, or risk facing data loss. Should the victim comply, the attackers can register the account and gain access to the victim's profile, settings, contacts, and block list through a device and mobile phone number under their control. There also exists an alternative infection sequence that takes advantage of the device linking option to trick victims into scanning a QR code, thereby granting the attackers access to the victim's account, including their messages for the last 45 days, on a device managed by them. The security authorities warned that while the current focus of the campaign appears to be Signal, the attack can also be extended to WhatsApp since it also incorporates similar device linking and PIN features as part of two-step verification. Similar attacks have been orchestrated by multiple Russia-aligned threat clusters tracked as Star Blizzard, UNC5792 (aka UAC-0195), and UNC4221 (aka UAC-0185).
Timeline
-
06.02.2026 22:00 2 articles · 1d ago
Germany Warns of Signal Account Hijacking Targeting Senior Figures
Germany's domestic intelligence agency warns of state-sponsored threat actors targeting high-ranking individuals via messaging apps like Signal. These attacks combine social engineering with legitimate features to steal data from politicians, military officers, diplomats, and investigative journalists in Germany and across Europe. The security advisory is based on intelligence collected by the Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI). The attacks involve impersonating Signal's support service and tricking targets into sharing their Signal PIN or an SMS verification code, leading to account hijacking. The second attack variant involves convincing the target to scan a QR code, abusing Signal’s legitimate linked-device feature to pair the account with the attacker’s device. Signal users are recommended to enable the 'Registration Lock' option and regularly review the list of devices with access to their account. The campaign involves threat actors masquerading as 'Signal Support' or a support chatbot named 'Signal Security ChatBot' to initiate direct contact with prospective targets, urging them to provide a PIN or verification code received via SMS, or risk facing data loss. Should the victim comply, the attackers can register the account and gain access to the victim's profile, settings, contacts, and block list through a device and mobile phone number under their control. There also exists an alternative infection sequence that takes advantage of the device linking option to trick victims into scanning a QR code, thereby granting the attackers access to the victim's account, including their messages for the last 45 days, on a device managed by them.
Show sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
17.12.2025 21:14 2 articles · 1mo ago
GhostPairing Campaign Abuses WhatsApp Device Linking
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing. The campaign was first spotted in Czechia but warns that the propagation mechanism allows it to spread to other regions. The attack starts with a short message from a known contact, sharing a link allegedly leading to an online photo of the victim. Victims are asked for their phone number, which the attacker uses to initiate a legitimate device-linking or login process. Once the victim enters the pairing code, the attacker has complete access to the account without needing to bypass any protections. Multiple threat actors, including cybercriminals, have adopted the technique in campaigns like GhostPairing to hijack accounts for scams and fraud.
Show sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
-
25.11.2025 08:42 3 articles · 2mo ago
CISA Warns of Active Spyware Campaigns Targeting High-Value Signal and WhatsApp Users
CISA has issued an alert warning of active spyware campaigns targeting high-value Signal and WhatsApp users. These campaigns use sophisticated social engineering and zero-click exploits to compromise mobile devices and exfiltrate sensitive data. The targets include government officials, military personnel, political figures, and civil society organizations across the U.S., Middle East, and Europe. CISA has identified multiple campaigns, including the hijacking of Signal accounts via linked devices, Android spyware campaigns like ProSpy and ToSpy, and the exploitation of iOS and WhatsApp vulnerabilities to target fewer than 200 users. A new campaign, dubbed GhostPairing, abuses the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes. This campaign was first spotted in Czechia but has the potential to spread to other regions. Germany's domestic intelligence agency has also warned of state-sponsored threat actors targeting high-ranking individuals via messaging apps like Signal. These attacks combine social engineering with legitimate features to steal data from politicians, military officers, diplomats, and investigative journalists in Germany and across Europe.
Show sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
Information Snippets
-
CISA has identified multiple spyware campaigns targeting high-value individuals using Signal and WhatsApp.
First reported: 25.11.2025 08:422 sources, 4 articlesShow sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Threat actors use sophisticated social engineering and zero-click exploits to compromise mobile devices.
First reported: 25.11.2025 08:422 sources, 4 articlesShow sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Campaigns include the hijacking of Signal accounts via linked devices, Android spyware campaigns like ProSpy and ToSpy, and the exploitation of iOS and WhatsApp vulnerabilities.
First reported: 25.11.2025 08:422 sources, 4 articlesShow sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Targets include government officials, military personnel, political figures, and civil society organizations across the U.S., Middle East, and Europe.
First reported: 25.11.2025 08:422 sources, 4 articlesShow sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
CISA recommends using end-to-end encrypted communications, enabling FIDO phishing-resistant authentication, and avoiding SMS-based MFA.
First reported: 25.11.2025 08:421 source, 2 articlesShow sources
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users — thehackernews.com — 25.11.2025 08:42
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
First reported: 17.12.2025 21:142 sources, 2 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The GhostPairing campaign was first spotted in Czechia but warns that the propagation mechanism allows it to spread to other regions.
First reported: 17.12.2025 21:142 sources, 3 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The attack starts with a short message from a known contact, sharing a link allegedly leading to an online photo of the victim.
First reported: 17.12.2025 21:141 source, 2 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
-
Victims are asked for their phone number, which the attacker uses to initiate a legitimate device-linking or login process.
First reported: 17.12.2025 21:141 source, 2 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
-
Once the victim enters the pairing code, the attacker has complete access to the account without needing to bypass any protections.
First reported: 17.12.2025 21:142 sources, 3 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
WhatsApp Web provides access to new messages in real time and allows viewing or downloading shared media.
First reported: 17.12.2025 21:142 sources, 3 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The only way to uncover the compromise is to go to Settings → Linked Devices, and check for unauthorized devices linked to the account.
First reported: 17.12.2025 21:142 sources, 3 articlesShow sources
- WhatsApp device linking abused in account hijacking attacks — www.bleepingcomputer.com — 17.12.2025 21:14
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Germany's domestic intelligence agency warns of state-sponsored threat actors targeting high-ranking individuals via messaging apps like Signal.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The attacks combine social engineering with legitimate features to steal data from politicians, military officers, diplomats, and investigative journalists in Germany and across Europe.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The security advisory is based on intelligence collected by the Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI).
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The attacks involve impersonating Signal's support service and tricking targets into sharing their Signal PIN or an SMS verification code, leading to account hijacking.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The second attack variant involves convincing the target to scan a QR code, abusing Signal’s legitimate linked-device feature to pair the account with the attacker’s device.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Signal lists all devices attached to the account under Settings > Linked devices, but users rarely check it.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Google threat researchers reported that the QR code pairing technique was employed by Russian state-aligned threat groups such as Sandworm.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Ukraine’s Computer Emergency Response Team (CERT-UA) attributed similar attacks to Russian hackers, targeting WhatsApp accounts.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Multiple threat actors, including cybercriminals, have adopted the technique in campaigns like GhostPairing to hijack accounts for scams and fraud.
First reported: 06.02.2026 22:001 source, 1 articleShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
-
Signal users can enable the 'Registration Lock' option under Settings > Account to prevent unauthorized account registration.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Users are recommended to regularly review the list of devices with access to their Signal account under Settings > Linked devices and remove unrecognized devices.
First reported: 06.02.2026 22:002 sources, 2 articlesShow sources
- Germany warns of Signal account hijacking targeting senior figures — www.bleepingcomputer.com — 06.02.2026 22:00
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The campaign involves threat actors masquerading as 'Signal Support' or a support chatbot named 'Signal Security ChatBot' to initiate direct contact with prospective targets.
First reported: 07.02.2026 13:151 source, 1 articleShow sources
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
The attackers urge victims to provide a PIN or verification code received via SMS, threatening data loss if they do not comply.
First reported: 07.02.2026 13:151 source, 1 articleShow sources
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Successful access to messenger accounts not only allows confidential individual communications to be viewed but also potentially compromises entire networks via group chats.
First reported: 07.02.2026 13:151 source, 1 articleShow sources
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
-
Similar attacks have been orchestrated by multiple Russia-aligned threat clusters tracked as Star Blizzard, UNC5792 (aka UAC-0195), and UNC4221 (aka UAC-0185).
First reported: 07.02.2026 13:151 source, 1 articleShow sources
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists — thehackernews.com — 07.02.2026 13:15
Similar Happenings
WhatsApp Introduces Lockdown-Style Security Mode for High-Risk Users
WhatsApp is rolling out a new security feature called Strict Account Settings to protect high-risk users, such as journalists and public figures, from advanced cyber attacks and spyware. This feature locks account settings to the most restrictive options and blocks media from unknown senders. Additionally, WhatsApp is adopting the Rust programming language for media sharing to enhance security and mitigate memory safety issues. The feature is gradually being rolled out and includes extreme safeguards such as two-step verification, blocking media from unknown senders, silencing calls from unknown people, and turning off link previews. WhatsApp has also patched zero-day vulnerabilities and faced legal actions against the NSO Group for spyware attacks.
Malicious npm package 'lotusbail' steals WhatsApp credentials and messages
A malicious npm package named 'lotusbail' has been discovered, which poses as a legitimate WhatsApp Web API library. The package steals WhatsApp authentication tokens, session keys, intercepts messages, and exfiltrates contact lists and media files. It has been available for at least six months with over 56,000 downloads. The package also links the attacker's device to the victim's WhatsApp account, granting persistent access even after removal. Researchers recommend checking for rogue linked devices and monitoring runtime behavior for unexpected outbound connections. The package was uploaded by a user named 'seiren_primrose' in May 2025 and has been downloaded 711 times in the last week. It uses a malicious WebSocket wrapper to capture credentials and chats, and the stolen data is transmitted to an attacker-controlled URL in encrypted form. The package also uses a hard-coded pairing code to hijack the device linking process and enters into an infinite loop trap when debugging tools are detected.
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
New Android Malware Families FvncBot, SeedSnatcher, and Enhanced ClayRat Target Financial and Cryptocurrency Data
Researchers have identified three new or enhanced Android malware families: FvncBot, SeedSnatcher, and an upgraded version of ClayRat. FvncBot targets Polish mobile banking users with keylogging, web-inject attacks, and hidden virtual network computing (HVNC) capabilities. SeedSnatcher steals cryptocurrency wallet seed phrases and intercepts SMS messages for 2FA codes. The updated ClayRat now abuses accessibility services for full device takeover, including screen recording and notification harvesting. These malware families use advanced techniques to evade detection and escalate privileges.
Predator Spyware Exploits Zero-Click Infection Vector via Malicious Ads
Predator spyware, developed by Intellexa, has been using a zero-click infection mechanism called Aladdin, which infects targets by displaying malicious advertisements. This vector is hidden behind shell companies across multiple countries and leverages the commercial mobile advertising system to deliver malware. The spyware is still operational and actively developed, with additional delivery vectors like Triton targeting Samsung Exynos devices. The infection occurs when a target views a malicious ad, which triggers a redirection to Intellexa’s exploit delivery servers. The ads are served through a complex network of advertising firms, making defense measures challenging. Despite sanctions and investigations, including fines from the Greek Data Protection Authority, Intellexa remains active and prolific in zero-day exploitation. Recent leaks reveal that Intellexa's Predator spyware has been marketed under various names, including Helios, Nova, Green Arrow, and Red Arrow. The spyware exploits multiple zero-day vulnerabilities in Android and iOS devices, and uses frameworks like JSKit for native code execution. Intellexa also has the capability to remotely access the surveillance systems of its customers using TeamViewer. The spyware collects extensive data from targeted devices, including messaging apps, calls, emails, device locations, screenshots, passwords, and other on-device information.