Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Home/CyberSecurity News/State-Backed Hackers Target Signal Messages of Officials
CyberSecurity News

State-Backed Hackers Target Signal Messages of Officials

Germany’s top security agencies yesterday issued an urgent warning regarding a sophisticated cyber espionage campaign. This operation specifically targets high-ranking officials and journalists...

Emy Elsamnoudy
Emy Elsamnoudy
February 7, 2026 2 Min Read
6 0

Germany’s top security agencies yesterday issued an urgent warning regarding a sophisticated cyber espionage campaign. This operation specifically targets high-ranking officials and journalists across Europe.

The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) revealed that state-sponsored hackers are hijacking Signal accounts to spy on private communications.​

The joint advisory, released February 6, identifies the primary targets as military personnel, diplomats, politicians, and investigative journalists.

Unlike traditional hacks that use malware or exploit software bugs, this campaign relies entirely on “social engineering”, tricking victims into using legitimate features against themselves.​

The “Fake Support” Trap

The first attack method involves hackers posing as “Signal Support” or a “Signal Security ChatBot.”

Fake Support - Source: Germany Govt
Fake Support – Source: Germany Govt

They contact targets directly within the app, claiming suspicious activity or a data leak has occurred on the victim’s device.

To “fix” the problem, the fake support bot asks the user to verify their identity by sending a PIN code.​

If a victim shares this six-digit code, the hackers immediately register the victim’s phone number on a new device they control.

This locks the legitimate user out of their own account while giving the attackers complete control to impersonate the victim in future chats.​

The Silent QR Code Spy

The second method is more subtle and allows hackers to spy on chats without locking the user out.

Attackers use a plausible pretext, such as a request to join a group or verify a device, to trick the victim into scanning a QR code.​

Technically, this QR code is a “device linking” request. When a victim scans it, they inadvertently authorize the hacker’s tablet or computer to link to their account.

Once connected, the attacker can silently read all new messages and view chat history from the past 45 days.

This access often persists for weeks because the victim’s phone usually continues to work, masking the intrusion.​

Authorities believe a “state-controlled cyber actor” is behind the campaign, given the specific focus on high-value intelligence targets rather than financial theft.

The goal appears to be espionage, involving the mapping of social networks and the interception of sensitive political and military discussions.​

Because the attacks use valid Signal features rather than viruses, they bypass most antivirus software.

Security officials urge all users to check their “Linked Devices” list in Signal settings immediately and never to share verification PINs with anyone, even accounts claiming to be support staff.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

OpenClaw v2026.2.6 Released With Support for Opus 4.6,

Next Post

BridgePay Payment Gateway Ransomware Attack Causes Outages

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us