Following revelations that hackers tied to the Russian government breached numerous German users’ accounts via focused phishing schemes, Signal, a secure messaging service, moves to strengthen its defenses. Though the core encryption stays intact, manipulation tactics targeting people – not systems – spark renewed alarm among experts.
Some reports suggest around 300 people in
Germany faced incidents, such as prominent politicians.
The head of the German parliament ranked among them, showing a shift toward targeting authorities, campaigners, and well-known personalities. Though less common before, such actions now point to more deliberate choices by offenders.
What happened did not involve any break-in at Signal’s core security setup. Their encryption methods stayed intact throughout the incidents. Hackers found another path – using deceptive messages aimed directly at people.
These tricks led some users to hand over private login details without realizing it. The app itself remained untouched, including its built-in privacy safeguards.
Reportedly, fake messages came from someone pretending to be “Signal Support,” arriving straight in user inboxes. Instead of ignoring them, some people gave up their single-use login codes, personal Signal PINs, along with backup account information.
With that data in hand, intruders then activated the targeted accounts on separate devices. Private conversations became reachable – all because stolen details allowed full transfer control.
Earlier warnings came from security experts across Europe, along with U.S. agencies like the FBI, flagging such tactics recently. Phishing efforts resembling these have drawn attention due to their repeated appearance.
Targets included individuals speaking out against China’s policies, according to reports. These patterns hint at coordinated monitoring backed by governmental support. Observers note the consistency in techniques points beyond random attacks.
Human behavior plays a central role in these breaches, differing from conventional hacks targeting code flaws.
Instead of cracking software defenses, intruders gain access by persuading individuals to disclose credentials. Once granted entry through trust rather than force, encrypted environments offer little resistance. Security analysts observe a shift: tricking people now works better than overcoming digital barriers. What used to require complex tools now succeeds with conversation.
Now working on new protections, Signal aims to make scam detection easier for its users.
Without revealing exact details, the team mentioned updates targeting phishing-driven breaches. These adjustments will start appearing within weeks. Changes are expected to limit how often accounts get compromised through deceptive messages.
Although the group operating Signal emphasizes strong privacy safeguards, these very protections reduce how much information they can gather.
Because messages are secured with end-to-end coding, personal chats remain hidden even from the service itself. Limited access to usage details means deeper inspection of scam attempts becomes difficult. Only minimal traces of activity stay visible, due to built-in system constraints.
Later updates show Signal warning people: real support teams won’t message inside the app, on social platforms, by text, or call asking for logins, access codes, or personal IDs.
Messages from the team arrive strictly vi
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article:
Related