Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/CyberSecurity News/FBI & CISA Warn: Russian Hackers Target High Targeting High-Value
CyberSecurity News

FBI & CISA Warn: Russian Hackers Target High Targeting High-Value

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) recently issued a joint cybersecurity advisory, warning of a widespread phishing campaign....

Marcus Rodriguez
Marcus Rodriguez
March 21, 2026 2 Min Read
0 0

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) recently issued a joint cybersecurity advisory, warning of a widespread phishing campaign.

The alert warns that Russian Intelligence Services are actively targeting users of encrypted messaging applications, primarily Signal.

The attackers are bypassing the platform’s robust end-to-end encryption by hijacking user accounts rather than compromising the underlying cryptographic protocols.

FBI, CISA Warn Russian Hackers

This cyber espionage campaign is meticulously designed to compromise individuals who possess high intelligence value.

The threat actors are specifically targeting current and former United States government officials, military personnel, influential political figures, and prominent journalists.

According to the intelligence agencies, the operation has already resulted in the unauthorised access of thousands of accounts on a global scale.

Because Signal’s core encryption remains secure, hackers rely entirely on deceptive social engineering techniques to trick victims into surrendering control of their profiles.

The attackers initiate contact by sending in-app messages that impersonate official automated support channels. These fraudulent profiles often use authoritative names such as “Signal Security Support ChatBot” or “Signal Security Team” to appear legitimate.

To manipulate the victims, the messages artificially manufacture a sense of urgency. They falsely claim that the user’s account has experienced a data leak, or that suspicious login attempts were detected from foreign locations and unrecognized devices.

The messages then instruct the target to complete a mandatory verification procedure to secure their account by handing over their SMS verification code or scanning a malicious QR code.

When a victim inadvertently shares their verification code, the attackers exploit the application’s linked device feature. This allows the hackers to tether their own hardware to the compromised account without raising immediate alarms.

Once inside, the threat actors gain the ability to silently monitor private conversations, read historical messages, and infiltrate private group chats.

Furthermore, they can harvest contact lists and impersonate the victim to launch secondary phishing campaigns against trusted colleagues.

Recommended Mitigations

To defend against these sophisticated account takeover attempts, the FBI and CISA urge users to implement strict security hygiene and vigilance.

  • Protect your accounts by never sharing verification codes or personal PINs with anyone, since legitimate support staff will never request authentication codes through direct messages.
  • Treat unexpected security alerts with extreme caution, and never scan unsolicited QR codes or click unverified links sent by unknown contacts.
  • Frequently audit the linked devices menu within the application settings to immediately spot and disconnect any unauthorized hardware.
  • Turn on the disappearing messages feature to automatically purge highly sensitive conversations after a specified time limit, minimizing the data available if an account is compromised.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitHackerphishingSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Chrome Update Fixes 26 Critical Remote Code Security Vulnerabilities

Next Post

Trivy Compromise: Script Injection Steals Credentials

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us