Russian cyberespionage groups target Signal users with fake group invites

Russian cyberespionage groups target Signal users with fake group invites Russian cyberespionage groups target Signal users with fake group invites

While many of the attacks observed so far have primarily focused on Ukraine-related targets, the Google researchers expect other threat groups to adopt similar techniques in the future, especially since other secure messaging apps have similar device-linking features. The Signal team added features in the latest releases to help protect against such attacks, so users are advised to update to the latest version as soon as possible.

Attack on Signal employs device linking as a backdoor

Signal is an open-source messaging application that uses end-to-end encryption (E2EE) for text messages as well as voice and video calls. In fact, the Signal developers are viewed as pioneers in the E2EE space, their Signal cryptographic protocol, which has been independently audited by academic researchers, being adopted by other apps over the years including Meta’s WhatsApp, Google Allo (discontinued), Google Messages, and Microsoft’s Skype (in private conversations mode).

The security audits, the code quality, and the open-source nature of both the app and the protocol have earned Signal the trust of many security researchers, journalists, political activists, politicians, military personnel, and of course, criminal groups. This has made the app a target for oppressive governments, law enforcement agencies, commercial surveillance companies, and intelligence agencies.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use