Dutch intelligence services AIVD and MIVD are warning of an active phishing campaign orchestrated by Russian state-sponsored actors targeting the Signal and WhatsApp accounts of high-value individuals. The targets include senior government officials, military personnel, civil servants, and journalists. The campaign is notable because it does not rely on zero-day exploits but on sophisticated social engineering tactics. Attackers impersonate official support channels to trick victims into divulging their verification codes or PINs, or into linking the attacker's device to their account. A successful attack grants the adversary full access to the victim's secure messaging history and future communications, providing a rich source of intelligence.
The compromise of a senior government official's or journalist's secure messaging app is a major intelligence failure. It can expose state secrets, diplomatic negotiations, military plans, or confidential sources. The "GhostPairing" attack is particularly insidious because the victim may not realize they have been compromised for a long time, allowing for prolonged intelligence collection by the adversary. This campaign highlights that even with end-to-end encryption, the human element remains a critical vulnerability.
The most critical mitigation is training users, especially high-value targets, to never share verification codes or PINs and to be suspicious of unsolicited support messages.
Enabling the Registration Lock (PIN) feature in Signal and WhatsApp acts as a second factor for account registration, mitigating the code theft attack.
Mapped D3FEND Techniques:
To defend against the account takeover tactics targeting Signal and WhatsApp, users must enable the built-in second factor for registration. In WhatsApp, this is called 'Two-Step Verification.' In Signal, it's the 'Registration Lock.' Both features require the user to create a PIN. When enabled, this PIN must be provided in addition to the SMS verification code whenever the account is registered on a new device. This single setting directly defeats the primary attack variant where Russian state hackers trick a user into sharing their SMS code. Even if the attacker obtains the SMS code, they cannot complete the account registration without also knowing the victim's secret PIN. All high-value targets, including government officials and journalists, must be mandated by policy to enable this feature on their secure messaging applications. It is a simple, user-configurable control that provides a powerful defense against this specific social engineering tactic.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats