By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Tech News

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

By Viral Trending Content 5 Min Read
Share
SHARE

Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts.

“The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ‘linked devices’ feature that enables Signal to be used on multiple devices concurrently,” the Google Threat Intelligence Group (GTIG) said in a report.

In the attacks spotted by the tech giant’s threat intelligence teams, the threat actors, including one it’s tracking as UNC5792, have resorted to malicious QR codes that, when scanned, will link a victim’s account to an actor-controlled Signal instance.

As a result, future messages get delivered synchronously to both the victim and the threat actor in real-time, thereby granting threat actors a persistent way to eavesdrop on the victim’s conversations. Google said UAC-0195 partially overlaps with a hacking group known as UAC-0195.

Cybersecurity

These QR codes are known to masquerade as group invites, security alerts, or legitimate device pairing instructions from the Signal website. Alternatively, the malicious device-linking QR codes have been found to be embedded in phishing pages that purport to be specialized applications used by the Ukrainian military.

“UNC5792 has hosted modified Signal group invitations on actor-controlled infrastructure designed to appear identical to a legitimate Signal group invite,” Google said.

Another threat actor linked to the targeting of Signal is UNC4221 (aka UAC-0185), which has targeted Signal accounts used by Ukrainian military personnel by means of a custom phishing kit that’s designed to mimic certain aspects of the Kropyva application used by the Armed Forces of Ukraine for artillery guidance.

Also used is a lightweight JavaScript payload dubbed PINPOINT that can collect basic user information and geolocation data through phishing pages.

Outside of UNC5792 and UNC4221, some of the other adversarial collectives that have trained their sights on Signal are Sandworm (aka APT44), which has utilized a Windows Batch script named WAVESIGN; Turla, which has operated a lightweight PowerShell script; and UNC1151, which has put to use the Robocopy utility to exfiltrate Signal messages from an infected desktop.

The disclosure from Google comes a little over a month after the Microsoft Threat Intelligence team attributed the Russian threat actor known as Star Blizzard to a spear-phishing campaign that leverages a similar device-linking feature to hijack WhatsApp accounts.

Last week, Microsoft and Volexity also revealed that multiple Russian threat actors are leveraging a technique called device code phishing to log into victims’ accounts by targeting them via messaging apps like WhatsApp, Signal, and Microsoft Teams.

“The operational emphasis on Signal from multiple threat actors in recent months serves as an important warning for the growing threat to secure messaging applications that is certain to intensify in the near-term,” Google said.

Cybersecurity

“As reflected in wide ranging efforts to compromise Signal accounts, this threat to secure messaging applications is not limited to remote cyber operations such as phishing and malware delivery, but also critically includes close-access operations where a threat actor can secure brief access to a target’s unlocked device.”

The disclosure also follows the discovery of a new search engine optimization (SEO) poisoning campaign that uses fake download pages impersonating popular applications like Signal, LINE, Gmail, and Google Translate to deliver backdoored executables aimed at Chinese-speaking users.

“The executables delivered through fake download pages follow a consistent execution pattern involving temporary file extraction, process injection, security modifications, and network communications,” Hunt.io said, adding the samples exhibit infostealer-like functionality associated with a malware strain referred to as MicroClip.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Honor Magic V5 Foldable Specs Officially Revealed

Hydrow Discount Code: Save Up to $150 in July

eir Achieves 99% 5G Coverage as Network Traffic Surges by 60% Year-on-Year

Top 5 Upgrades of the Google Pixel 10 Pro XL

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

TAGGED: cyber espionage, Cyber Security, Cybersecurity, hacking, Internet, Malware, mobile security, phishing, Russian hackers, Secure Messaging, Signal, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article Are ‘hushed hybrid’ working models rising despite RTO mandates?
Next Article Dogecoin Price Threatens Breakdown After Two H4 Retests
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

India’s macro setup stable, but markets await earnings firepower: Hemang Jani
Business
Mecha BREAK Peaks at Nearly 133,000 Concurrent Players on Steam at Launch
Gaming News
Honor Magic V5 Foldable Specs Officially Revealed
Tech News
Hydrow Discount Code: Save Up to $150 in July
Tech News
Clayton Kershaw, a throwback to baseball's past, could be the last to 3,000 strikeouts
Sports
ETH price prediction: Ether eyes $2,879 as technical indicators switch bullish
Crypto
Trump administration withholds $70 million in K-12 school funding from Colorado
Politics

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

India’s macro setup stable, but markets await earnings firepower: Hemang Jani

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
India’s macro setup stable, but markets await earnings firepower: Hemang Jani
July 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?