{"id":421748,"date":"2026-03-10T16:21:04","date_gmt":"2026-03-10T10:51:04","guid":{"rendered":"https:\/\/dripp.zone\/news\/russia-backed-hackers-targetting-signal-and-whatsapp-accounts-how-the-attack-works-how-to-stay-safe-and-more-crypto-news\/"},"modified":"2026-03-10T16:27:02","modified_gmt":"2026-03-10T10:57:02","slug":"russia-backed-hackers-targetting-signal-and-whatsapp-accounts-how-the-attack-works-how-to-stay-safe-and-more-crypto-news","status":"publish","type":"post","link":"https:\/\/dripp.zone\/news\/russia-backed-hackers-targetting-signal-and-whatsapp-accounts-how-the-attack-works-how-to-stay-safe-and-more-crypto-news\/","title":{"rendered":"Russia-backed hackers targetting Signal and WhatsApp accounts: How the attack works, how to stay safe and more &#8211; Crypto News"},"content":{"rendered":"<p><\/p>\n<div>\n<div id=\"article-index-0\" class=\"storyParagraph\">\n<p>Dutch intelligence agencies have issued a stark warning regarding a new, highly sophisticated global cyber campaign. Two intelligence agencies in the Netherlands warned earlier this week that Russian-backed hackers are gaining access to Signal and WhatsApp accounts used by officials, military personnel and journalists.<\/p>\n<\/div>\n<div id=\"article-index-1\" class=\"storyParagraph\">\n<p>\u201cThe Dutch intelligence and security services MIVD and AIVD can confirm that targets and victims of the campaign include Dutch government employees. The Dutch services also believe that other persons of interest to the Russian government, such as journalists, may possibly be targeted by this campaign.\u201d reads a blog by the agencies.<\/p>\n<\/div>\n<div id=\"article-index-2\" class=\"storyParagraph\">\n<p>Here is a breakdown of how the attacks are happening, the warning signs to look out for, and how to stay safe:<\/p>\n<\/div>\n<div id=\"article-index-3\" class=\"storyParagraph\">\n<h2>How are hackers gaining access to WhatsApp and Signal?<\/h2>\n<p>On <a rel=\"nofollow\" target=\"_blank\" class=\"backlink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/world\/did-iran-send-out-sleeper-cell-signal-us-alert-flags-encrypted-broadcast-after-khameneis-killing-in-iran-11773129889124.html\" data-vars-page-type=\"story\" data-vars-link-type=\"Manual\" data-vars-anchor-text=\"Signal\">Signal<\/a>, the bad actors are said to be masquerading as a legitimate Signal support chatbot in order to trick users into giving up crucial codes that would allow them to take control of the accounts.<\/p>\n<\/div>\n<div id=\"article-index-4\" class=\"storyParagraph\">\n<p>The hackers send messages claiming suspicious activity has been detected on the account and urge victims to complete a verification process. During this process, the attackers ask for an SMS verification code or the user&#8217;s Signal PIN which allows them to bypass the security locks and completely take control of the account.<\/p>\n<\/div>\n<div id=\"article-index-5\" class=\"storyParagraph\">\n<p>\u201cBecause Signal stores the chat history locally on the phone, a victim can regain access to that history after re-registering. As a result, the victim may assume that nothing is wrong. The Dutch services want to stress that this assumption could be incorrect,\u201d the report notes.<\/p>\n<\/div>\n<div id=\"article-index-6\" class=\"storyParagraph\">\n<p>Another trick uses the QR code and &#8220;linked devices&#8221; functionality present on both platforms where the attackers persuade victims to scan a QR code or click on a link.<\/p>\n<\/div>\n<div id=\"article-index-7\" class=\"storyParagraph\">\n<p>The report notes that the attackers may send malicious links disguised as invitations to join group chats but this QR code or link instead allows the attacker&#8217;s device to become silently linked to the account.<\/p>\n<\/div>\n<div id=\"article-index-8\" class=\"storyParagraph\">\n<p>Bad actors are then able to monitor ongoing conversations and read message histories without the legitimate user immediately noticing.<\/p>\n<\/div>\n<div id=\"article-index-9\" class=\"storyParagraph\">\n<h2>What do WhatsApp and Signal say?<\/h2>\n<p>In a post on X, Signal responded to the report, writing, \u201cSignal\u2019s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information \u2013 SMS codes and\/or Signal PIN \u2013 to gain access to users\u2019 accounts.\u201d<\/p>\n<\/div>\n<div id=\"article-index-12\" class=\"storyParagraph\">\n<p>\u201cThese attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent \u201cSignal Support Bot\u201d) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.\u201d the company added.<\/p>\n<\/div>\n<div id=\"article-index-13\" class=\"storyParagraph\">\n<p>Meanwhile, a Meta spokesperson told TechCrunch that <a rel=\"nofollow\" target=\"_blank\" class=\"backlink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/technology\/tech-news\/whatsapp-could-soon-offer-a-paid-subscription-tier-with-exclusive-stickers-and-ringtones-report-11772766720190.html\" data-vars-page-type=\"story\" data-vars-link-type=\"Manual\" data-vars-anchor-text=\"WhatsApp\">WhatsApp<\/a> suggests users never share their six-digit code with anyone while pointing them to a Help Center page to help users recognise suspicious messages, and a page about the Linked Devices feature.<\/p>\n<\/div>\n<div id=\"article-index-14\" class=\"storyParagraph\">\n<h2>How to stay safe?<\/h2>\n<p>In order to protect yourself from these sophisticated phishing attempts, the <a rel=\"nofollow\" target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/english.aivd.nl\/documents\/2026\/03\/09\/cybersecurity-advisory.-phishing-via-messaging-apps-signal-and-whatsapp\" target=\"_blank\" class=\"backlink\" data-vars-page-type=\"story\" data-vars-link-type=\"Manual\" data-vars-anchor-text=\"report\">report<\/a> also recommended taking the following safety precautions:<\/p>\n<\/div>\n<div id=\"article-index-15\" class=\"storyParagraph\">\n<p>The advisory warns against sending classified or sensitive information via apps like Signal and WhatsApp.<\/p>\n<\/div>\n<div id=\"article-index-16\" class=\"storyParagraph\">\n<p>Never share your verification codes: Signal will never contact you via an in-app message or <a rel=\"nofollow\" target=\"_blank\" class=\"backlink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/india\/received-sbi-rewards-message-beware-govt-warns-users-says-bank-never-sends-links-or-apk-files-over-sms-or-whatsapp-11766849895442.html\" data-vars-page-type=\"story\" data-vars-link-type=\"Manual\" data-vars-anchor-text=\"SMS\">SMS<\/a> to ask for your six-digit registration code or account PIN. Block any such messages that ask for your PIN.<\/p>\n<\/div>\n<div id=\"article-index-17\" class=\"storyParagraph\">\n<p>Enable two-step verification: On WhatsApp, turn on &#8216;Two-Step Verification&#8217; in your account settings. On Signal, enable &#8216;Registration Lock&#8217;. This will add an additional layer of security to your account.<\/p>\n<\/div>\n<div id=\"article-index-18\" class=\"storyParagraph\">\n<p>Turn on disappearing messages: The experts suggest turning on the disappearing messages feature. In case the device is compromised, this feature should prevent bad actors from gaining access to the entire chat history.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dutch intelligence agencies have issued a stark warning regarding a new, highly sophisticated global cyber campaign. Two intelligence agencies in the Netherlands warned earlier this week that Russian-backed hackers are gaining access to Signal and WhatsApp accounts used by officials, military personnel and journalists. \u201cThe Dutch intelligence and security services MIVD and AIVD can confirm [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":421756,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[188,183,185,186,2415,187,184,6448,688,1757,2549,46309,189,150,182,190,464,46310],"class_list":["post-421748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-blockchain-tech","tag-blockchain-technology","tag-crypto-technology","tag-cryptocurrency-technology","tag-hacker","tag-metaverse-technology","tag-nft-technology","tag-phishing","tag-phishing-attacks","tag-russian-hackers","tag-signal","tag-signal-accounts","tag-soul-bound-token","tag-tech","tag-technology","tag-token-technology","tag-whatsapp","tag-whatsapp-accounts"],"_links":{"self":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/comments?post=421748"}],"version-history":[{"count":1,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421748\/revisions"}],"predecessor-version":[{"id":421762,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421748\/revisions\/421762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media\/421756"}],"wp:attachment":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media?parent=421748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/categories?post=421748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/tags?post=421748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}