Germany Officially Attributes Phishing Campaign Targeting Politicians' Signal Accounts to Russia

Germany Accuses Russia of Orchestrating Large-Scale Signal Phishing Attack on Politicians

HIGH
April 26, 2026
5m read
PhishingCyberattackThreat Actor

Related Entities

Organizations

German Parliament

Products & Tech

Other

RussiaGermanyKonstantin von Notz

Full Report

Executive Summary

The German government has formally accused the Russian state of orchestrating a large-scale phishing campaign targeting the Signal messenger accounts of hundreds of politicians and senior officials. A government source explicitly stated, "The federal government is assuming that the phishing campaign...was presumably run from Russia." The attack aimed to compromise accounts to access sensitive communications, contacts, and group memberships, and potentially to impersonate the victims. The targets were extensive, including members of the German Parliament (Bundestag), civil servants, diplomats, and journalists. German prosecutors have initiated a formal investigation on suspicion of espionage. This event represents a serious escalation in cyber hostilities and is part of a pattern of increased Russian-attributed cyber operations against Germany since 2022.


Threat Overview

This incident is a classic example of a state-sponsored information gathering and espionage operation conducted through digital means. The choice of target and method suggests a clear intelligence objective.

  • Who: An unnamed, but Russian state-sponsored threat actor, as asserted by the German government.
  • What: A targeted phishing campaign designed to hijack Signal messenger accounts. The attackers sent messages masquerading as official Signal support, tricking users into revealing information that would allow an account takeover.
  • Whom: The targets were high-value individuals within the German political and administrative apparatus, including Members of Parliament (up to 300 accounts may have been compromised), the speaker of parliament, diplomats, and journalists.
  • Why: The primary motive is espionage. By gaining access to these accounts, the attackers could monitor private conversations, identify sensitive contacts, understand political strategies, and potentially gather blackmail material or spread disinformation by impersonating the account owners.
  • When: The campaign was active recently and has reportedly been stopped as of April 25, 2026.

Konstantin von Notz, a senior member of Germany's intelligence oversight committee, highlighted the severity of the attack, expressing concern over the guaranteed integrity of parliamentary communications.


Technical Analysis

The attack vector was social engineering delivered via the Signal platform itself, a method that leverages the trust users have in the application.

Attack Method: Phishing for Account Takeover

  1. Initial Contact: The attackers sent messages to targets on Signal. These messages were crafted to look like official communications from Signal's support team.
  2. The Lure: The message likely contained a false warning or a prompt requiring user action, such as 're-verifying your account' or 'securing your profile'.
  3. The Hook: The message would trick the user into either clicking a link to a malicious website or providing their phone number and potentially a verification code sent to their device. In Signal's case, an attacker might try to trick a user into re-registering their number on a device the attacker controls, and then socially engineer the user into providing the registration code.
  4. The Takeover: Once the attacker has the user's phone number and the Signal registration PIN or a new registration code, they can register the victim's Signal account on their own device. This would disconnect the legitimate user and give the attacker full access to the account's profile, contact list, and group memberships. While past message history is end-to-end encrypted and not stored on Signal's servers (and thus not accessible), all future communications and the victim's social graph would be compromised.

MITRE ATT&CK TTPs:


Impact Assessment

The potential impact of this campaign is substantial, even if no classified information was directly exposed.

  • Intelligence Gathering: Attackers could gain deep insight into political decision-making, internal party discussions, and diplomatic strategies.
  • Compromise of Trust: The attack erodes trust in secure communication platforms, which are vital for government officials and journalists.
  • Disinformation and Impersonation: A compromised account could be used to send false information to high-level contacts, potentially influencing policy or creating chaos.
  • Blackmail: Information from private chats, even if not classified, could be used to blackmail or discredit individuals.
  • Network Exposure: Gaining access to a politician's contact list reveals their network of trusted associates, who then become future targets.

This attack demonstrates that even with end-to-end encryption, the human element remains a vulnerability. The security of a system is often dependent on the user's ability to recognize and resist social engineering.


IOCs — Directly from Articles

No specific Indicators of Compromise (such as attacker phone numbers or phishing domains) were provided in the source articles.


Cyber Observables — Hunting Hints

Detecting this type of activity is difficult as it occurs within a closed, encrypted platform. The primary defense is user awareness. However, organizations can provide guidance:

Type
string_pattern
Value / Pattern
"Signal Support", "Verify your account", "Your account is at risk"
Description
Phishing lures commonly used in account takeover attempts.
Context
User education materials and security awareness training.
Confidence
high
Type
log_source
Value / Pattern
Signal 'Linked Devices' screen
Description
A sudden, unrecognized device appearing in the 'Linked Devices' section of the Signal app.
Context
User self-auditing of their own Signal account security settings.
Confidence
high
Type
other
Value / Pattern
Unsolicited messages from unknown contacts asking for personal information or to click links.
Description
The primary delivery mechanism for the phishing attempt.
Context
User awareness and reporting procedures.
Confidence
high

Detection & Response

Detection is almost entirely reliant on the user.

Detection:

  • User Reporting: The most effective detection method is a well-informed user base that can recognize and report suspicious messages. Organizations should have a clear, simple process for users to report such incidents to their security team.
  • Device Alerts: Signal provides in-app notifications when a new device is linked to an account. Users must be trained to treat these alerts with extreme suspicion if they did not initiate the action.

Response:

  1. Immediate Disconnect: If a user suspects their account is compromised, they should immediately go to Signal Settings > Linked Devices, identify the unrecognized device, and remove it.
  2. Re-secure Account: Users should enable a Registration Lock PIN in Signal settings. This requires the PIN to be entered when re-registering the phone number, preventing an attacker from taking over the account even if they manage to intercept a verification code.
  3. Notify Contacts: Inform contacts and groups about the potential compromise to prevent the attacker from impersonating the user and spreading the attack.

Mitigation

Mitigation is centered on user education and hardening account settings.

  1. Enable Registration Lock: This is the single most important mitigation. All users, especially high-risk individuals, must be instructed to set a strong, unique Registration Lock PIN within their Signal settings. (M1032 - Multi-factor Authentication)
  2. User Training: Conduct mandatory training that specifically covers social engineering tactics on messaging platforms. Emphasize that Signal support will never ask for codes, PINs, or personal information via a chat message. (M1017 - User Training)
  3. Verify Contacts: Train users to be skeptical of unusual requests, even from known contacts. If a message seems out of character, they should verify it through a separate communication channel (e.g., a phone call).
  4. Do Not Click Links: Institute a strict policy of not clicking links or providing information in response to unsolicited messages from unknown senders.
  5. Regularly Review Linked Devices: Instruct users to periodically check the 'Linked Devices' section of their Signal app to ensure no unauthorized devices are connected.

Timeline of Events

1
April 25, 2026
The German government publicly attributes a phishing campaign targeting politicians' Signal accounts to Russia.
2
April 25, 2026
German prosecutors announce a formal investigation into the cyberattacks on suspicion of espionage.
3
April 26, 2026
This article was published

MITRE ATT&CK Mitigations

The primary defense against this social engineering attack is training users to recognize illegitimate requests and never share verification codes or PINs.

In the context of Signal, the 'Registration Lock PIN' acts as a second factor, preventing account takeover even if a registration code is intercepted. Enforcing its use is critical.

Audit

M1047enterprise

Encourage users to regularly audit their 'Linked Devices' list within the Signal app to spot unauthorized connections.

D3FEND Defensive Countermeasures

In the context of the Signal phishing attack, the 'Registration Lock PIN' is the direct equivalent of a password. A 'Strong Password Policy' translates to mandating the use of this feature and providing guidance on creating a strong, non-obvious PIN. For high-risk users like politicians and journalists, the policy should require a complex alphanumeric PIN, not a simple 4-digit code. This D3FEND technique is the most critical technical control available within the Signal application to prevent the account takeover described. It acts as a second factor that the attacker cannot obtain simply by tricking the user into forwarding a one-time code. Organizations must treat the enforcement of this Signal feature with the same seriousness as they treat password policies for corporate email.

While technical User Behavior Analysis (UBA) is not possible within the encrypted Signal ecosystem, the concept must be applied through user training. This attack succeeds by exploiting a user's trust and lack of awareness. A 'behavioral' defense involves training users to analyze the 'behavior' of incoming messages. Key elements of this training should include: 1) Establishing a baseline: Signal support will NEVER contact you via a direct message to ask for codes. Any message doing so is malicious. 2) Anomaly detection: Be suspicious of unusual language, urgency, or requests from contacts that seem out of character. Verify through a second channel. 3) Alerting: Report any suspicious message immediately. By training the human as a UBA sensor, the organization can effectively detect and thwart social engineering campaigns that technical controls cannot see.

Timeline of Events

1
April 25, 2026

The German government publicly attributes a phishing campaign targeting politicians' Signal accounts to Russia.

2
April 25, 2026

German prosecutors announce a formal investigation into the cyberattacks on suspicion of espionage.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

GermanyRussiaPhishingSignalEspionageCyberattackGeopolitics

📢 Share This Article

Help others stay informed about cybersecurity threats