Close Menu
geekfence.comgeekfence.com
    What's Hot

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Modern transfer protocols evolving to protect cloud data

    May 1, 2026

    Voices from the field: Helping farmers build resilient local economies across rural America

    May 1, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Your Signal account is safe
    Cyber Security

    Your Signal account is safe

    AdminBy AdminMarch 12, 2026No Comments3 Mins Read6 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Your Signal account is safe
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Signal, the encrypted messaging app trusted by security-savvy users around the world, has confirmed that hackers have managed to takeover accounts — with government officials and journalists among those being targeted.

    The warning came earlier this week, when Signal posted on Bluesky that attacks had taken place, while underlining that its encryption and underlying central infrastructure remained intact and uncompromised.

    The problem is not with Signal itself, but rather with its users being tricked into handing over the keys to their accounts.

    On the same day, the Dutch General Intelligence and Security Service (AIVD) and Defence Intelligence and Security Service (MIVD) published a joint advisory blaming attacks against Signal and WhatsApp users on Russian-backed hackers.

    According to the Dutch intelligence agencies, the operation is “large-scale and global,” with victims confirmed to include Dutch government employees. Journalists are also understood to have been targeted.

    The attacks highlight that even the strongest encryption cannot protect you if you are tricked into control of your account over to a malicious hacker.

    Rather than trying to break the cryptography which protects messages sent via Signal or WhatsApp, attackers are simply persuading users to hand over their verification codes or unwittingly link a second device to their account — quietly giving attackers a access to private conversations.

    The hacking campaign uses two main techniques, neither of which requires exploiting any vulnerability in Signal or WhatsApp. Instead, the attackers rely on the tried-and-trusted trick of social engineering.

    As Signal explained in its post, targeted victims receive an in-app message which purports to come from “Signal Security Support Chatbot”, or a similar official-sounding account.

    The message claims that suspicious activity has been detected, and the victim is prompted to complete a “verification procedure” by entering their SMS verification code and Signal PIN.

    Of course, once the credentials have been handed over, attackers can register the victim’s account on a device under their control – gaining access to incoming messages and group chats.

    Another attack method abuses the “linked devices” feature used by Signal and WhatsApp. A hacker can send their intended target a QR code or link that appears to be a group chat invitation or routine security prompt. The reality is that scanning the QR code links the attacker’s device to the victim’s account, allowing their conversations to be monitored surreptitiously.

    According to Signal, it is working on adding more warnings within its app to alert users to the potential dangers of responding to a phishing message.

    According to the company, it says it will never contact users via in-app messages, SMS, or social media to request verification credentials. And if someone contacts you claiming to be the “Signal Security Support Chatbot” – well, they’re an attacker.

    You can review what devices are linked to your Signal and WhatsApp accounts by going to Settings > Linked Devices, and remove anything that you do not recognise.

    And remember – no amount of encryption can save you from being socially engineered.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Voices from the field: Helping farmers build resilient local economies across rural America

    May 1, 2026

    Iran-linked Handala hackers leak US Marines data, send chilling WhatsApp threats

    April 30, 2026

    The current state of prompt injections on the web

    April 29, 2026

    Microsoft to deprecate legacy TLS in Exchange Online starting July

    April 28, 2026

    Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

    April 27, 2026

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    April 26, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202533 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Your agents are only as good as the knowledge they can access — and only…

    Modern transfer protocols evolving to protect cloud data

    May 1, 2026

    Voices from the field: Helping farmers build resilient local economies across rural America

    May 1, 2026

    Poll: 1 in 5 Canadians more likely to buy an EV because of new rebate and gas prices

    May 1, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Introducing ACL Hydration: secure knowledge workflows for agentic AI

    May 1, 2026

    Modern transfer protocols evolving to protect cloud data

    May 1, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.