Saturday, February 7, 2026
HomeTechnologyGermany warns of Sign account hijacking focusing on senior figures

Germany warns of Sign account hijacking focusing on senior figures

Germany warns of Sign account hijacking focusing on senior figures

Germany’s home intelligence company is warning of suspected state-sponsored menace actors focusing on high-ranking people in phishing assaults through messaging apps like Sign.

The assaults mix social engineering with official options to steal information from politicians, navy officers, diplomats, and investigative journalists in Germany and throughout Europe.

The safety advisory is primarily based on intelligence collected by the Federal Workplace for the Safety of the Structure (BfV) and the Federal Workplace for Info Safety (BSI).

Wiz

“A defining attribute of this assault marketing campaign is that no malware is used, nor are technical vulnerabilities within the messaging providers exploited,” the 2 businesses inform.

Based on the advisory, the attackers contact the goal instantly, pretending to be from the help staff of the messaging service or the help chatbot.

“The purpose is to covertly acquire entry to one-to-one and group chats in addition to contact lists of the affected people,”

There are two variations of those assaults: one which performs a full account takeover, and one which pairs the account with the attacker’s machine to observe chat exercise.

Within the first variant, the attackers impersonate Sign’s help service and ship a pretend safety warning to create a way of urgency.

The goal is then tricked into sharing their Sign PIN or an SMS verification code, which permits the attackers to register the account to a tool they management. Then they hijack the account and lock out the sufferer.

Attackers impersonating Signal support in direct message
Attackers impersonating Sign help in direct message
Supply: BSI

Within the second case, the attacker makes use of a believable ruse to persuade the goal to scan a QR code. This abuses Sign’s official linked-device characteristic that enables including the account to a number of units (pc, pill, telephone).

The result’s that the sufferer account is paired with a tool managed by the dangerous actor, who will get entry chats and contacts with out elevating any flags.

QR code used for pairing a new device
QR code used for pairing a brand new machine
Supply: BSI

Though Sign lists all units hooked up to the account beneath Settings > Linked units, customers not often verify it.

Such assaults have been noticed to happen on Sign, however the bulletin warns that WhatsApp additionally helps comparable performance and will be abused in the identical method.

Final 12 months, Google menace researchers reported that the QR code pairing approach was employed by Russian state-aligned menace teams reminiscent of Sandworm.

Ukraine’s Pc Emergency Response Group (CERT-UA) additionally attributed comparable assaults to Russian hackers, focusing on WhatsApp accounts.

Nevertheless, a number of menace actors, together with cybercriminals, have since adopted the approach in campaigns like GhostPairing to hijack accounts for scams and fraud.

The German authorities counsel that customers keep away from replying to Sign messages from alleged help accounts, because the messaging platform by no means contacts customers instantly.

As a substitute, recipients of those messages are beneficial to dam and report these accounts.

As an additional safety step, Sign customers can allow the ‘Registration Lock’ possibility beneath Settings > Account. As soon as energetic, Sign will ask for a PIN you set every time somebody tries to register your telephone quantity with the applying.

With out the PIN code, the Sign account registration on one other machine fails. For the reason that code is crucial for registration, shedding it can lead to shedding entry to the account.

It’s also strongly beneficial that customers frequently assessment the listing of units with entry to your Sign account beneath Settings → Linked units, and take away unrecognized units.

Fashionable IT infrastructure strikes quicker than handbook workflows can deal with.

On this new Tines information, find out how your staff can scale back hidden handbook delays, enhance reliability via automated response, and construct and scale clever workflows on prime of instruments you already use.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments