Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing Campaign
FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing Campaign
NEWS

FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing Campaign

FBI and CISA alert warns Russian state actors have compromised thousands of messaging accounts belonging to US government officials, military personnel,...

Dylan H.

News Desk

March 22, 2026
4 min read

Russian Intelligence Services Compromise Thousands of Messaging Accounts

The FBI and CISA issued a joint advisory on March 20, 2026, warning that threat actors affiliated with Russian Intelligence Services are conducting a large-scale global phishing campaign targeting users of Signal, WhatsApp, and other commercial messaging applications.


AttributeValue
Threat ActorRussian Intelligence Services (GRU-affiliated)
Campaign TypeSocial engineering / phishing (no malware)
TargetsUS government officials, military, politicians, journalists
Apps TargetedSignal, WhatsApp
Accounts CompromisedThousands globally
First ReportedDutch MIVD/AIVD (March 9, 2026)
US Advisory DateMarch 20, 2026

How the Signal Attack Works

The attackers impersonate Signal's support team, contacting targets directly within the app with warnings about suspicious activity, a "possible data leak," or unauthorized access attempts. If the target engages, the attackers:

  1. Request a verification code sent via SMS — which the attackers themselves trigger from Signal's servers
  2. Ask for the target's PIN code
  3. Use both credentials to hijack the account and link it to attacker-controlled devices

WhatsApp Exploitation

For WhatsApp, the attackers abuse the "Linked Devices" feature, which allows users to access WhatsApp from secondary devices like laptops. By tricking targets into scanning a malicious QR code or approving a device link, attackers gain persistent access to all messages without the victim's knowledge.


Impact AreaDescription
Account TakeoverFull access to messages, contacts, and media
ImpersonationAbility to send messages as the victim
Lateral PhishingSecondary phishing from trusted identities
Intelligence CollectionAccess to sensitive government communications
Operational SecurityCompromises secure channels used for classified discussions

Who Is at Risk

The Netherlands' Defence Intelligence and Security Service (MIVD) and General Intelligence and Security Service (AIVD) first published details about the campaign on March 9, describing it as targeting individuals of "high intelligence value" globally. The FBI advisory expanded the scope to include:

  • Current and former US government officials
  • Military personnel across NATO countries
  • Political figures and campaign staff
  • Journalists covering national security topics

Recommendations

For High-Value Targets

  • Enable Registration Lock in Signal (Settings → Account → Registration Lock)
  • Review Linked Devices in both Signal and WhatsApp regularly
  • Never share verification codes or PIN numbers with anyone claiming to be support
  • Use hardware security keys for two-factor authentication where supported

For Organizations

  • Brief personnel on this specific social engineering technique
  • Implement endpoint detection for unauthorized device linking
  • Consider moving classified discussions to government-approved encrypted platforms
  • Monitor for anomalous login patterns on messaging platforms

Key Takeaways

  1. Russian intelligence is exploiting trust in encrypted messaging apps — the security of the encryption is irrelevant when the account itself is compromised
  2. No malware is involved — this is pure social engineering, making it harder to detect with traditional security tools
  3. Thousands of accounts have already been compromised globally, with victims unaware their messages are being read
  4. The campaign enables cascading attacks — compromised accounts are used to phish additional targets from a trusted identity
  5. Both Signal and WhatsApp are targeted through different but equally effective techniques
  6. Government employees should immediately audit their linked devices and enable all available account protections

Sources

  • FBI/CISA Joint Cybersecurity Advisory (March 20, 2026)
  • Russian government hackers targeting Signal and WhatsApp users — TechCrunch
  • FBI Warns Russian Hackers Target Signal, WhatsApp — The Hacker News
  • Signal and WhatsApp accounts targeted in phishing campaign — Malwarebytes
#Nation-State#Russia#Phishing#FBI#CISA

Related Articles

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read

Operation Epic Fury Triggers Unprecedented Cyber Escalation

Following the joint U.S.-Israeli military operation against Iran, Palo Alto Networks Unit 42 reports an unprecedented surge in cyber retaliation with...

3 min read

Diesel Vortex: Russian Cybercrime Ring Steals 1,649

A Russian-linked phishing operation dubbed Diesel Vortex has stolen over 1,649 credentials from major freight and logistics companies across the US and...

4 min read
Back to all News