Dutch Intel Warns of Russian Hackers Hijacking Signal, WhatsApp Attacks

Hackread – Cybersecurity News, Data Breaches, AI and More
Actively Exploited

Overview

Dutch intelligence agencies have issued a warning about Russian hackers who are targeting Signal and WhatsApp accounts. These attackers are using fake support bots and scams that trick users into providing verification codes. The primary targets of these scams are officials and journalists, raising concerns about the potential for unauthorized access to sensitive communications. This incident highlights the ongoing risks posed by cybercriminals and the need for users to be vigilant when managing their online accounts. As these platforms are commonly used for secure communication, any compromise could have serious implications for privacy and security.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Signal, WhatsApp
  • Action Required: Users should enable two-factor authentication and be cautious of unsolicited messages or requests for verification codes.
  • Timeline: Newly disclosed

Original Article Summary

Dutch intelligence warns Russian hackers are hijacking Signal and WhatsApp accounts using fake support bots and verification code scams targeting officials and journalists.

Impact

Signal, WhatsApp

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should enable two-factor authentication and be cautious of unsolicited messages or requests for verification codes.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Intel.

Related Coverage

New HHS toolkit helps healthcare sector gauge cyber preparedness

SCM feed for Latest

The Department of Health and Human Services (HHS) has rolled out an updated toolkit designed to assist healthcare organizations in evaluating their cybersecurity measures. This Risk Identification and Site Criticality toolkit aims to help these organizations spot potential vulnerabilities and assess their readiness against cyber threats. With the healthcare sector frequently targeted by cyberattacks, this initiative is crucial for ensuring patient data security and maintaining operational integrity. By providing a structured approach to risk assessment, the HHS hopes to bolster the overall cybersecurity posture of healthcare facilities nationwide. This toolkit is a significant step in addressing the growing concerns over cybersecurity in the healthcare industry.

Mar 10, 2026

Ericsson US discloses data breach after service provider hack

BleepingComputer

Ericsson Inc., the U.S. branch of the Swedish telecommunications company, has reported a data breach resulting from a cyberattack on one of its service providers. The breach has led to the theft of sensitive information belonging to an undisclosed number of employees and customers. While the company has not specified the exact nature of the stolen data or the service provider involved, this incident raises significant concerns about the security of third-party vendors and their impact on larger organizations. The breach highlights the ongoing risks companies face from attacks that exploit vulnerabilities in their supply chains. Users and businesses associated with Ericsson should remain vigilant and monitor for any unusual activity related to their data.

Mar 9, 2026

Trump cyber policy focuses on offensive operations, harnessing AI

SCM feed for Latest

The article discusses a significant shift in cybersecurity policy under former President Trump, moving away from a secure-by-design approach to one that emphasizes offensive operations. This change suggests that the U.S. may focus more on proactive measures, potentially targeting adversaries before they can launch attacks. The implications of this policy could affect various sectors, including government and private industry, as it raises questions about the legality and ethics of offensive cyber actions. By harnessing artificial intelligence, the policy aims to enhance the effectiveness of these operations but also opens up discussions about the potential risks involved. Overall, this shift reflects a broader strategy in national security that prioritizes preemptive actions in cyberspace.

Mar 9, 2026

OpenAI to acquire AI security platform Promptfoo

Help Net Security

OpenAI is set to acquire Promptfoo, a platform that specializes in securing AI systems. The goal of this acquisition is to enhance OpenAI's Frontier platform, which is designed for developing and managing AI coworkers. As more businesses begin to integrate AI into their operations, the need for thorough testing and risk assessment of these systems has become increasingly important. Promptfoo's technology will help enterprises identify vulnerabilities during the development phase, ensuring that AI agents function safely and comply with necessary regulations. This move signifies a proactive approach to AI security, addressing the potential risks associated with deploying AI in real-world applications.

Mar 9, 2026

AI agents are acting like employees. You’re governing them like tools.

SCM feed for Latest

A recent discussion has emerged about the increasing use of AI agents in workplaces, which are starting to resemble human employees in their functions. However, these AI agents are often not governed properly, leading to significant security concerns. Without appropriate oversight, they can inadvertently expose sensitive information or make decisions that compromise security. This situation affects companies that utilize AI tools without adequate policies in place to manage their behavior and interactions. As AI continues to play a larger role in business operations, it's crucial for organizations to establish clear governance frameworks to mitigate these risks.

Mar 9, 2026

Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS

Hackread – Cybersecurity News, Data Breaches, AI and More

Researchers have identified a fraudulent website mimicking CleanMyMac that employs a ClickFix attack to install SHub Stealer malware on macOS devices. This malicious software is designed to steal sensitive information, including passwords and cryptocurrency wallet data. Users who unknowingly download this malware may face significant risks to their personal and financial security. The incident serves as a reminder for macOS users to be cautious about where they download software and to verify the authenticity of websites before entering any personal information. Ensuring that systems are protected with up-to-date security measures is crucial in preventing such attacks.

Mar 9, 2026