Russian State Hackers Target Signal & WhatsApp Accounts of High-Value Individuals

Dutch Intelligence Warns of Russian Phishing Campaign to Hijack Signal and WhatsApp Accounts

HIGH
March 11, 2026
4m read
PhishingThreat ActorMobile Security

Related Entities

Organizations

AIVDMIVD

Products & Tech

Full Report

Executive Summary

Dutch intelligence services AIVD and MIVD are warning of an active phishing campaign orchestrated by Russian state-sponsored actors targeting the Signal and WhatsApp accounts of high-value individuals. The targets include senior government officials, military personnel, civil servants, and journalists. The campaign is notable because it does not rely on zero-day exploits but on sophisticated social engineering tactics. Attackers impersonate official support channels to trick victims into divulging their verification codes or PINs, or into linking the attacker's device to their account. A successful attack grants the adversary full access to the victim's secure messaging history and future communications, providing a rich source of intelligence.


Threat Overview

  • Threat Actor: Russian state-backed hackers (unspecified group).
  • Targets: High-value individuals in the Netherlands and likely other Western nations.
  • Platforms: Signal and WhatsApp.
  • Vector: Social Engineering and Phishing. This is an attack on the user, not the application.

Attack Variant 1: Verification Code Theft

  1. Initiate Contact: The attacker contacts the target on Signal or WhatsApp, posing as an official entity like "Signal Support Chatbot."
  2. Create Pretext: The message creates a false sense of urgency, claiming there has been a data leak or suspicious activity on the victim's account.
  3. Social Engineering: The attacker instructs the victim to "verify" their account. This involves triggering a re-registration process, which sends a legitimate SMS verification code to the victim's phone.
  4. Theft: The attacker then asks the victim to forward the SMS code back to them in the chat. If the victim complies, the attacker uses the code to register the victim's account on their own device, taking it over completely.

Attack Variant 2: Linked Device Abuse ('GhostPairing')

  1. Lure: The attacker sends the target a message with a link or a QR code, again under a plausible pretext (e.g., "Scan this to join a secure group").
  2. Link Device: If the victim scans the QR code or clicks the link within the app's "Linked Devices" feature, they are unknowingly pairing the attacker's device (e.g., a web browser session) with their account.
  3. Espionage: The attacker now has a live, synchronized copy of the victim's Signal or WhatsApp account. They can silently read all incoming and outgoing messages in real-time without taking over the account, making the compromise much harder to detect.

Impact Assessment

The compromise of a senior government official's or journalist's secure messaging app is a major intelligence failure. It can expose state secrets, diplomatic negotiations, military plans, or confidential sources. The "GhostPairing" attack is particularly insidious because the victim may not realize they have been compromised for a long time, allowing for prolonged intelligence collection by the adversary. This campaign highlights that even with end-to-end encryption, the human element remains a critical vulnerability.

Detection and Response

  • Review Linked Devices: All users, especially those in sensitive positions, should regularly review the list of "Linked Devices" in their Signal and WhatsApp settings. Any unrecognized device should be immediately unlinked.
  • Be Skeptical of Unsolicited Messages: Be extremely wary of any unsolicited messages, even those that appear to be from support or security teams. These services will never ask for your PIN or verification code in a chat.
  • Enable Registration Lock (PIN): Both Signal and WhatsApp offer a Registration Lock or Two-Step Verification feature which requires a PIN to register your phone number on a new device. This provides a crucial second layer of defense against the verification code theft attack.

Mitigation

  • User Education: This threat is almost entirely mitigated by user awareness. High-value targets must be specifically trained on these tactics. The key message is simple: Never share your verification code or PIN with anyone. Ever.
  • Disable Link Previews: In some cases, disabling link previews in messaging apps can reduce the effectiveness of certain lures.
  • Organizational Policy: Organizations with employees in sensitive roles should establish clear policies regarding the use of messaging apps and provide regular training on threats like these. They should also have a clear process for employees to report suspicious contact attempts.

Timeline of Events

1
March 11, 2026
This article was published

MITRE ATT&CK Mitigations

The most critical mitigation is training users, especially high-value targets, to never share verification codes or PINs and to be suspicious of unsolicited support messages.

Enabling the Registration Lock (PIN) feature in Signal and WhatsApp acts as a second factor for account registration, mitigating the code theft attack.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Users should be instructed to regularly audit the 'Linked Devices' list in their messaging apps and remove any unrecognized sessions.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against the account takeover tactics targeting Signal and WhatsApp, users must enable the built-in second factor for registration. In WhatsApp, this is called 'Two-Step Verification.' In Signal, it's the 'Registration Lock.' Both features require the user to create a PIN. When enabled, this PIN must be provided in addition to the SMS verification code whenever the account is registered on a new device. This single setting directly defeats the primary attack variant where Russian state hackers trick a user into sharing their SMS code. Even if the attacker obtains the SMS code, they cannot complete the account registration without also knowing the victim's secret PIN. All high-value targets, including government officials and journalists, must be mandated by policy to enable this feature on their secure messaging applications. It is a simple, user-configurable control that provides a powerful defense against this specific social engineering tactic.

Sources & References

Signal and WhatsApp accounts targeted in phishing campaign
Malwarebytes (malwarebytes.com) March 10, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingSocial EngineeringSignalWhatsAppState-SponsoredRussia

📢 Share This Article

Help others stay informed about cybersecurity threats