Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State-Backed Hackers Exploit Signal to Target Officials

State-Backed Hackers Exploit Signal to Target Officials

Posted on February 7, 2026 By CWS

Germany’s leading security organizations have issued a critical alert about an advanced cyber espionage operation targeting senior officials and journalists across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) have identified state-sponsored hackers as the culprits, exploiting Signal accounts to monitor private communications.

Targeting High-Ranking Figures

In a statement released on February 6, the agencies outlined that the primary targets include military personnel, diplomats, politicians, and investigative journalists. Unlike conventional cyber attacks that depend on malware or software vulnerabilities, this campaign leverages social engineering to manipulate victims into inadvertently compromising their security.

The “Fake Support” Technique

One of the attack strategies involves hackers masquerading as “Signal Support” or a “Signal Security ChatBot.” These imposters contact users directly within the app, alleging suspicious activity or a data leak on the victim’s device. To resolve the issue, they instruct the user to verify their identity by sending a PIN code.

Once a victim provides this six-digit code, the hackers register the victim’s phone number on a new device controlled by them. This action locks the legitimate user out of their account, allowing attackers to impersonate the victim in subsequent communications.

The Subtle QR Code Intrusion

Another method employed by the hackers is more discreet, enabling them to surveil communications without locking out the user. By concocting a plausible pretext, such as a group invitation or device verification request, attackers trick the victim into scanning a QR code. This code is essentially a device linking request. When scanned, it authorizes the hacker’s device to connect to the victim’s account. This connection permits attackers to silently read new messages and access chat history from the past 45 days.

Authorities suspect a state-sponsored cyber entity is orchestrating these attacks due to the focus on intelligence gathering rather than financial gain. The objective appears to be espionage, including mapping social networks and intercepting sensitive political and military communications.

Since the attack methods utilize legitimate Signal features, they can evade most antivirus software. Security officials strongly advise users to review their “Linked Devices” list in Signal settings and to never share verification PINs, even with accounts claiming to be support staff.

Stay updated on cybersecurity news by following us on Google News, LinkedIn, and X. Reach out if you have stories to share.

Cyber Security News Tags:Cybersecurity, data security, Espionage, Germany, Hacking, Journalists, military officials, Signal app, social engineering, state-sponsored attacks

Post navigation

Previous Post: Urgent Replacement of Discontinued Edge Devices Advised
Next Post: German Agencies Issue Alert on Signal Phishing Threat

Related Posts

Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain Cyber Security News
Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Cyber Security News
BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News
Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Cyber Security News
Remote File Upload Vulnerability in Cisco Meeting Management Remote File Upload Vulnerability in Cisco Meeting Management Cyber Security News
Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News