Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Retroid’s $69 second screen is ready for your favorite DS games

    June 9, 2025

    Everything Apple Announced at WWDC 2025

    June 9, 2025

    iOS 26’s new ‘adaptive power’ mode dials back performance to save battery

    June 9, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
    Security

    A Signal Update Fends Off a Phishing Technique Used in Russian Espionage

    News RoomBy News RoomFebruary 20, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    For more than a decade now, Russian cyberwarfare has used Ukraine as a test lab for its latest hacking techniques, methods that often target Ukrainians first before they’re deployed more broadly. Now Google is warning of a Russian espionage trick that’s been used to obtain Ukrainians’ messages on the encrypted platform Signal—and one that both Ukrainians and other Signal users worldwide should protect themselves against with a new update to the app.

    Google’s threat intelligence team on Wednesday released a report revealing how multiple hacker groups that serve Russian state interests are targeting Signal, the end-to-end encrypted messaging tool that has become widely accepted as a standard for private communications and is now often used by Ukrainians, including in the Ukrainian military’s battlefield communications. Those Russia-linked groups, which Google has given the working names UNC5792 and UNC4221, are taking advantage of a Signal feature that allows users to join a Signal group by scanning a QR code from their phone. By sending phishing messages to victims, often over Signal itself, both hacker groups have spoofed those group invites in the form of QR codes that instead hide javascript commands that link the victim’s phone to a new device—in this case, one in the hands of an eavesdropper who can then read every message the target sends or receives.

    “It looks exactly like a group invite, and everything would function exactly like that, except when you scan it, it links the device out,” says Dan Black, a Google cyberespionage researcher and former NATO analyst. “It instantly pairs your device with theirs. And all your messages are now, in real time, being delivered over to the threat actor while you’re receiving them.”

    Two months ago, Google began warning the Signal Foundation that maintains the private communications platform about Russia’s use of the QR code phishing technique, and Signal last week finished rolling out an update for iOS and Android designed to counter the trick. The new safeguard warns users when they link a new device and checks with them again at a randomized interval a few hours after that device is added to confirm that they still want to share all messages with it. Signal now also requires a form of authentication such as entering a passcode or using FaceID or TouchID on iOS to add a new linked device.

    In fact, Signal had already been working to update those forms of phishing protections aimed specifically at exploitation of its linked device feature prior to Google’s warning, says Signal’s senior technologist, Josh Lund. But Google’s report about Russia’s spying in Ukraine provided an “acute” example of the problem that pushed them to move quickly to protect users, he says.

    “We’re really grateful to the Google team for their help in making Signal more resilient to this type of social engineering,” says Lund, using the cybersecurity term for tricks that deceive victims into giving hackers sensitive information or access to their systems.

    Both Google and Signal emphasized that the phishing technique Google has seen in use in Ukraine doesn’t suggest that Signal’s encryption is broken or that the app’s messages can otherwise be eavesdropped in transit. Instead, the trick essentially combines two legitimate features—QR-code group invites and QR-code device linking that pairs a smartphone with a laptop—invisibly swapping one with the other to deceive users. “Phishing is a big problem on the internet, and it’s never nice to hear that someone has fallen victim to one of these attacks,” Lund says. “But we’re trying to do our best to keep users safe, and we think these recent improvements will really help.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleMetals Crucial to Clean Energy Are Getting Caught Up in the US–China Trade War
    Next Article Oppo’s new foldable can remote control a Mac

    Related Posts

    Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

    June 9, 2025

    ICE Quietly Scales Back Rules for Courthouse Raids

    June 9, 2025

    What Really Happened in the Aftermath of the Lizard Squad Hacks

    June 7, 2025

    How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

    June 5, 2025

    The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare

    June 5, 2025

    A GPS Blackout Would Shut Down the World

    June 4, 2025
    Our Picks

    Everything Apple Announced at WWDC 2025

    June 9, 2025

    iOS 26’s new ‘adaptive power’ mode dials back performance to save battery

    June 9, 2025

    Apple punts on Siri updates as it struggles to keep up in the AI race

    June 9, 2025

    Uber Just Reinvented the Bus … Again

    June 9, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Apple’s Liquid Glass was a wild change to my iPhone

    By News RoomJune 9, 2025

    After staring at, scrolling through, and puzzling over Apple’s new Liquid Glass design language on…

    The Dome 2 Is a Silicon Valley Air Fryer That Will Cook Faster, Clean Itself, and Bake a Pizza

    June 9, 2025

    You can now try Microsoft’s new Start menu for Windows 11

    June 9, 2025

    Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

    June 9, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.