Germany warns of state-linked phishing campaign targeting journalists, government officials

German authorities are warning that a suspected state-controlled threat actor is using messaging apps such as Signal to target senior political, military and diplomatic figures, as well as investigative journalists, across Europe.

In a joint advisory issued late last week, Germany’s domestic intelligence agency (BfV) and federal cybersecurity office (BSI) said attackers are attempting to gain access to private messaging accounts in order to monitor confidential communications and potentially compromise broader networks.

Officials said the campaign relies on social engineering rather than malware or software vulnerabilities, exploiting legitimate security features built into messaging platforms. The current activity is focused on Signal, authorities said, but similar methods could be used against other messaging platforms with comparable features, including WhatsApp.

Germany has not attributed this campaign to a specific threat actor but said the techniques used in the latest attacks could be replicated by both state-backed hackers and cybercriminals.

“Given the high-profile target set, current known cases are likely attributable to a state-controlled cyber actor,” the advisory said.

Primary attack methods

Authorities identified two main attack variants. In one of them, the hackers impersonate official support teams or automated chatbots and contact targets directly through messaging apps. The messages often begin with an urgent security warning that claims private data could be lost without immediate action.

Victims are then asked to share account security PINs or SMS verification codes, allowing attackers to register the account on a device they control and take over communications.

In another variant, attackers abuse legitimate device-linking features that allow users to connect messaging accounts to additional devices. Victims are persuaded to scan a QR code, which instead links the victim’s account to a device controlled by the attacker, enabling ongoing access to contact lists, recent message history and future communications.

Security researchers have previously warned that Signal’s widespread adoption among military personnel, government officials, journalists and activists has made it a high-value target for espionage operations.

Ukrainian state officials said Russian state-backed hackers were targeting Signal messenger accounts — including those used by Ukrainian military personnel and government officials — in an effort to access sensitive information that could aid Moscow’s war effort.

Researchers at Google also discovered a campaign in which the notorious Russian threat actor Sandworm assisted Russian military forces in linking Signal accounts from captured battlefield devices to their own systems for further exploitation.

Signal did not respond to a request for comment.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

From Ransomware to Residency: Inside the Rise of the Digital Parasite

Next Post

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Related Posts

CISO’s Expert Guide To AI Supply Chain Attacks

AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here.  TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication - Malicious package uploads to open-source repositories jumped 156% in
Read More

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution. The weaknesses, discovered by the JFrog Security Research team, are listed below - CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More