Russia-linked hackers target Signal, WhatsApp of officials globally

Security Affairs
Actively Exploited

Overview

Dutch intelligence agencies have issued a warning about a concerted effort by Russia-linked hackers to access the Signal and WhatsApp accounts of government and military officials around the world. This campaign is particularly concerning because it targets individuals in sensitive positions, including civil servants and military personnel, indicating a broader strategy to undermine national security. The implications of such breaches could be severe, as compromised communication channels may lead to unauthorized access to confidential information and disrupt governmental operations. The ongoing nature of this threat underscores the need for enhanced security measures among officials who rely on these messaging platforms for secure communication.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Signal, WhatsApp
  • Action Required: Officials should enhance their security practices, including using two-factor authentication and being wary of phishing attempts.
  • Timeline: Newly disclosed

Original Article Summary

Russia-linked hackers are targeting Signal and WhatsApp accounts of government and military officials worldwide, warns Dutch intelligence. Dutch intelligence agencies (MIVD and AIVD) warn of a global campaign by Russia-linked threat actors aiming to compromise Signal and WhatsApp accounts. The operation targets government officials, civil servants, and military personnel, highlighting growing cyber risks to sensitive […]

Impact

Signal, WhatsApp

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Officials should enhance their security practices, including using two-factor authentication and being wary of phishing attempts.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

This spy tool has been quietly stealing data for years

Help Net Security

ESET researchers have identified a resurgence of the Sednit group, a hacking collective linked to the Russian military intelligence agency, GRU. This group has been using a new toolkit that includes two implants, BeardShell and Covenant, which operate through separate cloud providers to maintain their surveillance capabilities. Since April 2024, these tools have been actively monitoring Ukrainian military personnel, indicating a sustained and targeted effort to steal sensitive data. The situation raises significant concerns about the security of military communications and the potential for further espionage activities. Understanding these tactics is crucial for developing defenses against similar attacks in the future.

Mar 10, 2026

Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials

Infosecurity Magazine

Dutch intelligence has reported that Russian state-sponsored hackers are attempting to take control of the Signal and WhatsApp accounts belonging to military and government officials around the world. This campaign targets key figures, which raises significant concerns about national security and the protection of sensitive communications. The hackers are likely aiming to gather intelligence or disrupt operations by accessing private conversations and data. The implications of such attacks are serious, as they could compromise not just individual accounts but also broader governmental and military communications. As these messaging platforms are widely used for secure communication, this incident underscores the need for enhanced security measures for users in sensitive positions.

Mar 10, 2026

New HHS toolkit helps healthcare sector gauge cyber preparedness

SCM feed for Latest

The Department of Health and Human Services (HHS) has rolled out an updated toolkit designed to assist healthcare organizations in evaluating their cybersecurity measures. This Risk Identification and Site Criticality toolkit aims to help these organizations spot potential vulnerabilities and assess their readiness against cyber threats. With the healthcare sector frequently targeted by cyberattacks, this initiative is crucial for ensuring patient data security and maintaining operational integrity. By providing a structured approach to risk assessment, the HHS hopes to bolster the overall cybersecurity posture of healthcare facilities nationwide. This toolkit is a significant step in addressing the growing concerns over cybersecurity in the healthcare industry.

Mar 10, 2026

Bipartisan energy cybersecurity bills gain House panel nod

SCM feed for Latest

The House Energy and Commerce Committee has taken a significant step by approving a bipartisan package of cybersecurity bills aimed at strengthening the protection of the energy sector. Leading this initiative is the Rural and Municipal Utility Cybersecurity Act, which focuses on enhancing cybersecurity measures for smaller utilities that may lack the resources of larger companies. This legislation is crucial as it addresses the vulnerabilities in the energy infrastructure that could be targeted by cyberattacks. By promoting cybersecurity readiness among rural and municipal utilities, the bill aims to safeguard essential services against potential disruptions. The approval of this package reflects a growing recognition of the need for robust cybersecurity frameworks in the energy sector, especially as threats continue to evolve.

Mar 10, 2026

Dutch Intel Warns of Russian Hackers Hijacking Signal, WhatsApp Attacks

Hackread – Cybersecurity News, Data Breaches, AI and More

Dutch intelligence agencies have issued a warning about Russian hackers who are targeting Signal and WhatsApp accounts. These attackers are using fake support bots and scams that trick users into providing verification codes. The primary targets of these scams are officials and journalists, raising concerns about the potential for unauthorized access to sensitive communications. This incident highlights the ongoing risks posed by cybercriminals and the need for users to be vigilant when managing their online accounts. As these platforms are commonly used for secure communication, any compromise could have serious implications for privacy and security.

Mar 9, 2026

Ericsson US discloses data breach after service provider hack

BleepingComputer

Ericsson Inc., the U.S. branch of the Swedish telecommunications company, has reported a data breach resulting from a cyberattack on one of its service providers. The breach has led to the theft of sensitive information belonging to an undisclosed number of employees and customers. While the company has not specified the exact nature of the stolen data or the service provider involved, this incident raises significant concerns about the security of third-party vendors and their impact on larger organizations. The breach highlights the ongoing risks companies face from attacks that exploit vulnerabilities in their supply chains. Users and businesses associated with Ericsson should remain vigilant and monitor for any unusual activity related to their data.

Mar 9, 2026