Advertisement

Russia-aligned threat groups dupe Ukrainian targets via Signal

Google researchers say multiple Russian state threat groups have conducted remote phishing operations to target and compromise Signal accounts.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
Russian soldiers stand on Red Square in central Moscow on September 29, 2022, as the square is sealed prior to a ceremony of the incorporation of the new territories into Russia. (Photo by ALEXANDER NEMENOV/AFP via Getty Images)

Russian state threat groups have compromised Signal accounts used by Ukrainian military and government personnel to eavesdrop on real-time communications, Google Threat Intelligence Group said in a report released Wednesday.

“This is a persistent, ongoing campaign being carried out by multiple different Russia-aligned threat actors,” Dan Black, principal analyst at Google Threat Intelligence Group, said in an email to CyberScoop.

Researchers observed three threat groups escalating efforts to compromise Signal accounts, likely to gain access to sensitive information of interest to Russia’s intelligence services, including intelligence on the country’s invasion of Ukraine. Some of the ongoing efforts date back to 2023.

Government officials, political figures and vulnerable populations have turned to Signal and other encrypted messaging apps to reduce the risk of cybercriminals snooping on communications. Federal cyber authorities in December encouraged the use of Signal and other encrypted message apps in the wake of Salt Typhoon’s spree of attacks on U.S. and global telecom networks.

Advertisement

Threat groups’ growing efforts to target Signal and other secure messaging applications puts the outlook for these platforms — alternatives to less secure forms of communication — at elevated risk.

“Targeting tends to scale with popularity,” Black said. “The more society adopts these secure messaging apps for day-to-day use, the more we are likely to see them targeted by other threat actors across espionage and financial motives.”

The volume of tactics and Russia-aligned threat groups targeting end-to-end encrypted messaging apps is steadily increasing, Black said.

The most widely used technique observed by Google threat intelligence involves abuse of Signal’s linked devices feature, which allows users to access the app on multiple devices concurrently. Threat groups have crafted and tricked Ukrainian military and government personnel into scanning malicious QR codes that link the victim’s account to a threat group-controlled Signal account.

Remote phishing operations — including malicious QR codes, altered legitimate group invites, security alerts and other device-pairing instructions — have provided Russian threat groups a persistent means to surveil conversations in real time.

Advertisement

About half of the activity observed by Google Threat Intelligence Group was post-compromise, according to a researcher with the group.

Sandworm, a threat group Google tracks as APT44 that operates on behalf of the Russian Main Military Intelligence Unit 74455 (GRU), has also enabled Russian military forces to link Signal accounts on devices captured on the battlefield to infrastructure controlled by the threat group for follow-on exploitation, the report said. 

Google linked two other suspected Russian threat groups — UNC5792 and UNC4221 — to active targeting of Signal accounts.

Google Threat Intelligence Group said it investigated the malicious activity with Signal, which pushed security updates to its Android and iOS apps to help bolster accounts against similar phishing techniques in the future. 

Signal did not respond to a request for comment.

Advertisement

Researchers warn the threat isn’t limited to Signal, but extends to other messaging platforms, including WhatsApp and Telegram.

“This latest activity is yet another example of the lengths threat actors will go through to find novel methods to compromise sensitive, encrypted communications,” Black said. “The good news though is these encrypted messaging apps present a substantial challenge for all threat actors — even those backed by the GRU — to collect these signals at scale.”

Matt Kapko

Written by Matt Kapko

Matt Kapko is a reporter at CyberScoop. His beat includes cybercrime, ransomware, software defects and vulnerability (mis)management. The lifelong Californian started his journalism career in 2001 with previous stops at Cybersecurity Dive, CIO, SDxCentral and RCR Wireless News. Matt has a degree in journalism and history from Humboldt State University.

Latest Podcasts