On November 24, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert warning of multiple threat actors actively leveraging commercial spyware to compromise mobile messaging applications, specifically Signal and WhatsApp. The campaigns target high-value individuals, including government and military officials, through sophisticated attack vectors. These methods range from social engineering, such as phishing and malicious QR code linking, to highly advanced zero-click exploits. A successful compromise can lead to unauthorized access to sensitive communications and can serve as a pivot point for a full mobile device takeover, enabling espionage and data theft.
CISA's advisory highlights a growing threat from the proliferation of commercial spyware, which lowers the barrier to entry for sophisticated surveillance capabilities. Threat actors are targeting the secure communication channels that high-profile individuals rely on. The attack vectors are diverse:
While CISA notes the targeting is currently opportunistic, the victimology points to a clear focus on individuals with access to sensitive information: government officials, military personnel, and members of civil society organizations (CSOs) in the United States, Europe, and the Middle East.
The campaigns described by CISA involve several stages and techniques, aligning with the MITRE ATT&CK framework for Mobile.
T1476 - Deliver Malicious App via Other Means. The use of malicious QR codes is a form of T1648.002 - Multi-Factor Authentication Request Generation where the 'second factor' is the device link. Zero-click exploits leverage vulnerabilities in the application's code, corresponding to T1404 - Exploit via Application.T1402 - Masquerade as Legitimate App and T1400 - Boot or Logon Autostart Execution.T1405 - Exploit via Kernel.T1412 - Contact List Discovery, T1414 - Call Log Discovery), accessing files (T1409 - System Information Discovery), and activating the microphone or camera (T1424 - Capture Audio, T1425 - Capture Video). Data is then exfiltrated over the network (T1428 - Exfiltrate Data to Cloud Storage).| Tactic | Technique ID | Name | Description |
|---|---|---|---|
| Initial Access | T1404 |
Exploit via Application | Zero-click exploits leverage vulnerabilities in messaging apps. |
| Initial Access | T1476 |
Deliver Malicious App via Other Means | Phishing attacks deliver malicious links or QR codes. |
| Collection | T1429 |
Read Application Data | Spyware accesses and reads messages from Signal and WhatsApp. |
| Collection | T1424 |
Capture Audio | Spyware can activate the device's microphone for eavesdropping. |
| Exfiltration | T1428 |
Exfiltrate Data to Cloud Storage | Stolen data is sent to attacker-controlled servers. |
The compromise of secure messaging apps used by high-value individuals poses a significant national security risk. It can lead to the exposure of classified information, diplomatic negotiations, military plans, or sensitive corporate strategies. For civil society organizations and journalists, such surveillance can endanger individuals, expose sources, and suppress dissent. The psychological impact on victims, knowing their private communications are being monitored, is also profound. Since the initial compromise can lead to a full device takeover, the potential for damage extends beyond message content to include all data stored on or accessible from the device.
Detecting sophisticated mobile spyware, especially zero-click variants, is extremely challenging for end-users. However, some indicators might be present:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| other | Unexpected linked devices | An unknown or unauthorized device appearing in the 'Linked Devices' section of WhatsApp or Signal. | User review of application settings. | high |
| network_traffic_pattern | Unusual battery drain or data usage | A compromised device may exhibit higher-than-normal battery consumption or data traffic as spyware operates in the background. | Mobile device settings, carrier data usage reports. | low |
| process_name | Unrecognized running applications | An unfamiliar process or application running in the background, though spyware is often heavily obfuscated. | Advanced mobile forensics tools (e.g., MVT). | low |
| other | Strange device behavior | Random reboots, slow performance, or apps crashing unexpectedly can sometimes indicate a malware infection. | User observation. | low |
Due to the stealthy nature of these attacks, prevention is more effective than detection. Users must be vigilant and organizations must enforce strict mobile security policies.
D3-LAM - Local Account Monitoring.D3-NTA - Network Traffic Analysis.CISA recommends several best practices:
M1051 - Update Software.M1017 - User Training.WhatsApp zero-click attacks surge globally, 2FA critical defense against widespread exploitation.
Promptly install updates for mobile operating systems and messaging applications to patch vulnerabilities exploited by zero-click attacks.
Mapped D3FEND Techniques:
Educate users to recognize and avoid social engineering tactics, such as phishing links and unsolicited QR code scanning requests.
Enable features like Registration Lock or a PIN within messaging apps to act as a second factor and prevent account takeover.
Mapped D3FEND Techniques:
Deploy Mobile Threat Defense (MTD) solutions to monitor for anomalous behavior indicative of spyware.
Enforce a strict and timely software update policy for all mobile devices, covering both the operating system (iOS/Android) and all installed applications, especially Signal and WhatsApp. For corporate-managed devices, use a Mobile Device Management (MDM) solution to automate and enforce the installation of security patches. This is the single most effective defense against zero-click exploits, which rely on unpatched vulnerabilities. For high-risk individuals, consider enabling automatic updates and conducting regular compliance checks to ensure devices are never left in a vulnerable state. A delay of even a few days in patching can provide a window of opportunity for attackers to deploy sophisticated spyware.
Mandate the activation of all available security features within Signal and WhatsApp for high-risk users. This includes setting a 'Registration Lock PIN' in WhatsApp or a 'Registration Lock' in Signal to prevent SIM-swapping attacks and unauthorized account re-registration. Additionally, users should be required to periodically review the 'Linked Devices' section of their apps to identify and remove any unauthorized sessions. Disabling link previews in messaging apps can also reduce the attack surface by preventing the app from automatically fetching data from potentially malicious URLs. These configuration changes raise the bar for attackers and provide crucial safeguards against common account takeover techniques.
Train high-value targets to adopt a high-vigilance mindset when using mobile messaging. This goes beyond generic anti-phishing advice. Training should be specific to the threat, focusing on the danger of unsolicited QR codes, unexpected requests for multi-factor authentication, and messages that create a false sense of urgency. Conduct regular, simulated social engineering tests that mimic the TTPs described by CISA. Users should be taught to verify any unusual request through a separate, secure communication channel before taking action. For example, if a contact asks to scan a QR code, the user should call them to confirm the request is legitimate. This human firewall is a critical defense layer against non-technical attack vectors.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats