Dutch Intelligence Warns of Russian Signal Phishing Campaign
Dutch intelligence services issued a warning on March 9 about an active Russian state-sponsored phishing campaign targeting Signal and WhatsApp users. The attackers are specifically going after government officials, military personnel, and journalists to gain access to their encrypted messaging accounts.
The campaign uses sophisticated social engineering techniques to trick targets into revealing their account credentials. TechCrunch reports that the attacks have been ongoing for several weeks, with Dutch authorities tracking the activity back to known Russian threat groups.
High-Value Targets in Government and Media
The phishing campaign primarily targets individuals with access to sensitive information. Government officials across multiple departments are being targeted, along with military personnel who use these messaging apps for operational communications.
Journalists covering national security topics have also been identified as targets. The attackers appear to be selecting victims based on their potential access to classified or sensitive communications rather than conducting broad phishing campaigns.
Account Hijacking Through Credential Theft
The Russian hackers are using fake login pages that mimic Signal and WhatsApp's authentication interfaces. Once victims enter their credentials, attackers gain full access to their messaging history and can monitor ongoing conversations.
Security experts warn that compromised accounts allow attackers to read encrypted messages and potentially impersonate victims in sensitive communications. Dutch authorities recommend enabling two-factor authentication and verifying any unexpected login requests through official channels.







