Home / News & Politics / German Government Attributes Major Signal Phishing Attack to Russia

German Government Attributes Major Signal Phishing Attack to Russia

Overview of the Signal Phishing Attack

A large-scale phishing attack targeting users of the encrypted messaging app Signal has been identified, with multiple members of the German federal government reportedly affected. The attack involves cybercriminals impersonating Signal support staff to gain unauthorized access to private communications, including messages, photos, and documents shared via the app. The German government has attributed this broad phishing campaign to Russian state actors, citing intelligence from domestic and international security agencies. The attack has been ongoing since at least February and targets not only politicians but also military personnel, journalists, NATO representatives, and intelligence staff [Source 1][Source 2][Source 3][Source 6][Source 8].

Suspected Russian Involvement and Affected Parties

Federal security agencies, including the Federal Office for the Protection of the Constitution and the Federal Office for Information Security, have informed affected individuals about the phishing attacks. The German government asserts that the origin of these attacks is linked to Russia, based on evidence shared by partners such as the FBI and Dutch intelligence services. The victims include high-ranking politicians like Bundestag President Bärbel Bas and Bundestagsabgeordnete from various parties. The attackers exploit the high trust Signal users place in the app’s security to infiltrate sensitive governmental communication channels [Source 1][Source 2][Source 3][Source 6][Source 8].

Implications for Expats and International Residents in Germany

Expats, international students, and foreign workers in Germany, especially those engaged in political, diplomatic, or security sectors using Signal, should be aware of the heightened risk of targeted phishing scams. The Signal app, often recommended for secure communications, has now become a vector for cyber espionage. Users should be cautious regarding unsolicited requests for account information posing as technical support. It is advisable to enable all available security features on Signal, such as two-factor authentication, and to stay updated on warnings issued by German cybersecurity authorities. While the attack primarily targets government officials and related sectors, the wider community using Signal should also increase vigilance against phishing attempts [Source 1][Source 6][Source 8].

Recommended Actions and Security Measures

The German federal government’s response includes notifying victims promptly and coordinating with international partners to handle the cyber threat. Signal users in Germany, particularly those within professional environments that handle sensitive data, are urged to regularly update their app, verify communication channels, and be skeptical of unsolicited support contacts. Users should never share security codes or sensitive information via messages, even if requests appear legitimate. Taking these precautions can help mitigate risks until the attack campaign is conclusively stopped. No additional deadlines or legal obligations have yet been announced, but maintaining informed vigilance remains critical [Source 1][Source 6][Source 8].

For further details, see the original report in German: tagesschau.de.

Tagged: