Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State-Backed Hackers Exploit Signal to Target Officials

State-Backed Hackers Exploit Signal to Target Officials

Posted on February 7, 2026 By CWS

Germany’s leading security organizations have issued a critical alert about an advanced cyber espionage operation targeting senior officials and journalists across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) have identified state-sponsored hackers as the culprits, exploiting Signal accounts to monitor private communications.

Targeting High-Ranking Figures

In a statement released on February 6, the agencies outlined that the primary targets include military personnel, diplomats, politicians, and investigative journalists. Unlike conventional cyber attacks that depend on malware or software vulnerabilities, this campaign leverages social engineering to manipulate victims into inadvertently compromising their security.

The “Fake Support” Technique

One of the attack strategies involves hackers masquerading as “Signal Support” or a “Signal Security ChatBot.” These imposters contact users directly within the app, alleging suspicious activity or a data leak on the victim’s device. To resolve the issue, they instruct the user to verify their identity by sending a PIN code.

Once a victim provides this six-digit code, the hackers register the victim’s phone number on a new device controlled by them. This action locks the legitimate user out of their account, allowing attackers to impersonate the victim in subsequent communications.

The Subtle QR Code Intrusion

Another method employed by the hackers is more discreet, enabling them to surveil communications without locking out the user. By concocting a plausible pretext, such as a group invitation or device verification request, attackers trick the victim into scanning a QR code. This code is essentially a device linking request. When scanned, it authorizes the hacker’s device to connect to the victim’s account. This connection permits attackers to silently read new messages and access chat history from the past 45 days.

Authorities suspect a state-sponsored cyber entity is orchestrating these attacks due to the focus on intelligence gathering rather than financial gain. The objective appears to be espionage, including mapping social networks and intercepting sensitive political and military communications.

Since the attack methods utilize legitimate Signal features, they can evade most antivirus software. Security officials strongly advise users to review their “Linked Devices” list in Signal settings and to never share verification PINs, even with accounts claiming to be support staff.

Stay updated on cybersecurity news by following us on Google News, LinkedIn, and X. Reach out if you have stories to share.

Cyber Security News Tags:Cybersecurity, data security, Espionage, Germany, Hacking, Journalists, military officials, Signal app, social engineering, state-sponsored attacks

Post navigation

Previous Post: Urgent Replacement of Discontinued Edge Devices Advised
Next Post: German Agencies Issue Alert on Signal Phishing Threat

Related Posts

Windows 11 24H2 Update KB5064081 Breaks Video Content Playback Windows 11 24H2 Update KB5064081 Breaks Video Content Playback Cyber Security News
Python-powered Toolkit for Information Gathering and reconnaissance Python-powered Toolkit for Information Gathering and reconnaissance Cyber Security News
Ransomware Attack on Romanian Waters Authority Ransomware Attack on Romanian Waters Authority Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News