Germany warns of state-linked phishing campaign targeting journalists, government officials

German authorities are warning that a suspected state-controlled threat actor is using messaging apps such as Signal to target senior political, military and diplomatic figures, as well as investigative journalists, across Europe.

In a joint advisory issued late last week, Germany’s domestic intelligence agency (BfV) and federal cybersecurity office (BSI) said attackers are attempting to gain access to private messaging accounts in order to monitor confidential communications and potentially compromise broader networks.

Officials said the campaign relies on social engineering rather than malware or software vulnerabilities, exploiting legitimate security features built into messaging platforms. The current activity is focused on Signal, authorities said, but similar methods could be used against other messaging platforms with comparable features, including WhatsApp.

Germany has not attributed this campaign to a specific threat actor but said the techniques used in the latest attacks could be replicated by both state-backed hackers and cybercriminals.

“Given the high-profile target set, current known cases are likely attributable to a state-controlled cyber actor,” the advisory said.

Primary attack methods

Authorities identified two main attack variants. In one of them, the hackers impersonate official support teams or automated chatbots and contact targets directly through messaging apps. The messages often begin with an urgent security warning that claims private data could be lost without immediate action.

Victims are then asked to share account security PINs or SMS verification codes, allowing attackers to register the account on a device they control and take over communications.

In another variant, attackers abuse legitimate device-linking features that allow users to connect messaging accounts to additional devices. Victims are persuaded to scan a QR code, which instead links the victim’s account to a device controlled by the attacker, enabling ongoing access to contact lists, recent message history and future communications.

Security researchers have previously warned that Signal’s widespread adoption among military personnel, government officials, journalists and activists has made it a high-value target for espionage operations.

Ukrainian state officials said Russian state-backed hackers were targeting Signal messenger accounts — including those used by Ukrainian military personnel and government officials — in an effort to access sensitive information that could aid Moscow’s war effort.

Researchers at Google also discovered a campaign in which the notorious Russian threat actor Sandworm assisted Russian military forces in linking Signal accounts from captured battlefield devices to their own systems for further exploitation.

Signal did not respond to a request for comment.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

From Ransomware to Residency: Inside the Rise of the Digital Parasite

Next Post

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Related Posts

From Ransomware to Residency: Inside the Rise of the Digital Parasite

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed across 2025, attackers are no longer optimizing for
Read More

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization," Ontinue security researcher Rhys Downing said in a report
Read More

Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to and including version 2.7. "Telnetd in GNU Inetutils through 2.7 allows remote authentication bypass
Read More