Back

Phishing Attacks Target German Politicians via Signal App

Severity: High (Score: 77.0)

Sources: Devdiscourse, Streetinsider, Uk.News.Yahoo, cyberwarzone.com, Securityaffairs.Co

Summary

German federal prosecutors have launched an investigation into a series of phishing attacks targeting politicians, military personnel, and journalists using the Signal messaging app. The attacks have reportedly compromised the Signal accounts of Bundestag President Julia Kloeckner and attempted to breach Chancellor Friedrich Merz's account. The phishing method involves social engineering tactics, where attackers impersonate Signal support to extract sensitive information from victims. The domestic intelligence agency BfV has warned that these attacks are likely state-sponsored and are part of a broader campaign that has been ongoing since mid-April. Security services have indicated that the integrity of communications among affected officials is currently uncertain. The attacks are part of a larger trend of cyber threats facing Germany since the escalation of tensions with Russia following its invasion of Ukraine in 2022. The investigation is ongoing, with further details yet to be disclosed. Key Points: • Phishing attacks on Signal have targeted high-profile German politicians and journalists. • At least two accounts, including that of Bundestag President Julia Kloeckner, have been compromised. • The attacks are suspected to be state-sponsored, possibly linked to Russia.

Key Entities

  • Phishing (attack_type)
  • Bundestag (company)
  • German Parliament (company)
  • Signal (company)
  • England (country)
  • Germany (country)
  • Lebanon (country)
  • Netherlands (country)
  • North Korea (country)
  • Government (industry)
  • T1566.002 - Spearphishing Link (mitre_attack)
  • T1566 - Phishing (mitre_attack)
  • WhatsApp (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed