Back

Phishing Attacks Target German Politicians via Messaging Apps

Severity: High (Score: 72.5)

Sources: Channelnewsasia, Straitstimes, Uk.News.Yahoo

Summary

German federal prosecutors are investigating a series of phishing attacks targeting high-profile politicians, diplomats, military officers, and journalists via messaging apps, particularly Signal. The campaign, attributed to state-sponsored actors, has reportedly compromised the Signal account of parliamentary president Julia Kloeckner and attempted to breach Chancellor Friedrich Merz's account. The domestic intelligence service BfV has warned that attackers are leveraging social engineering tactics rather than malware to gain access to sensitive communications. The attacks have been ongoing since mid-April 2026, with indications that they are escalating. Security services emphasize that the communications of government officials are conducted through secure channels. The BSI has also noted that similar methods could be applied to other messaging platforms like WhatsApp. The investigation is ongoing, with no specific targets or suspects publicly identified yet. Key Points: • Phishing attacks targeting German politicians are linked to state-sponsored actors. • The Signal messaging app is the primary vector for these attacks, with social engineering tactics used. • Ongoing investigations by German authorities began in mid-April 2026.

Key Entities

  • Phishing (attack_type)
  • German Parliament (company)
  • Signal (company)
  • Germany (country)
  • Russia (country)
  • Ukraine (country)
  • Government (industry)
  • T1566 - Phishing (mitre_attack)
  • WhatsApp (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed