Key Takeaways
- Berlin holds Russia responsible for a large‑scale phishing campaign that compromised dozens of German Signal accounts, including those of senior officials such as Bundestag President Julia Klöckner.
- Attackers used social‑engineering tactics to obtain verification codes, gaining access to chat histories, files, and phone numbers.
- The Dutch AIVD and the FBI have independently warned of a Russian‑linked global effort targeting Signal and WhatsApp users in government, military, and civil‑service sectors.
- Russian state‑backed hacking groups have moved from financially motivated ransomware to disruptive, destructive operations against Ukraine’s Western allies since the 2022 invasion.
- Moscow consistently denies involvement, framing accusations as anti‑Russian propaganda, while simultaneously seeking to tighten domestic digital controls, e.g., attempting to block WhatsApp.
Berlin Attributes Signal Phishing to Russia
On April 25, Der Spiegel reported that the German government believes Russia is behind a widespread phishing operation targeting the Signal messaging service. Citing undisclosed government sources, the article noted that Berlin judges the attack “presumably originated in Russia.” The revelation came after weeks of intelligence gathering and followed a similar warning from Dutch authorities a month earlier.
Phishing Methodology Exploits Verification Codes
According to the report, attackers sent deceptive messages within Signal chats that persuaded recipients to disclose security verification codes and one‑time passcodes. Possession of these codes allowed the hackers to hijack accounts, read private conversations, export attached files, and harvest linked phone numbers. The technique mirrors classic credential‑phishing but leverages the trust inherent in encrypted messaging platforms.
Signal Confirms Targeted Phishing Incidents
In response to the media coverage, Signal issued a brief statement on its social‑media channels acknowledging awareness of “targeted phishing attacks that have led to some account takeovers.” The company emphasized that its end‑to‑end encryption remains intact but warned users to remain vigilant against social‑engineering attempts that bypass cryptographic protections by stealing authentication tokens.
Dutch Intelligence Issues Global Warning
The Netherlands’ General Intelligence and Security Service (AIVD) released a statement on March 9 asserting that “Russian state hackers are engaged in a large‑scale global cyber campaign to gain access to Signal and WhatsApp accounts belonging to dignitaries, military personnel, and civil servants.” The AIVD noted that the campaign was not limited to Germany but spanned multiple European and allied nations, reflecting a coordinated effort to infiltrate diplomatic and security communications.
FBI Director Kash Patel Echoes Concern
Echoing the Dutch warning, FBI Director Kash Patel told lawmakers in March that the bureau had identified Russian‑linked cyber actors actively probing messaging services, including Signal, for vulnerabilities. Patel highlighted that the activity fits a broader pattern of Russian intelligence seeking strategic intelligence through cyber espionage, rather than purely financial gain.
Historical Context of Russian‑Linked Hacking
Russian‑affiliated hacking groups have operated for decades, traditionally focusing on financially motivated schemes such as ransomware and banking fraud. However, since Russia’s full‑scale invasion of Ukraine in February 2022, analysts have observed a marked shift toward disruptive and destructive cyber operations aimed at weakening NATO members and Ukraine’s supporters. This transition aligns with Moscow’s broader military‑strategic objectives.
Cyber as a Pillar of Russian Hybrid Warfare
Cyberattacks have become a central component of Russia’s hybrid warfare doctrine, which blends conventional military action with information, economic, and cyber tools. European governments have repeatedly accused Moscow of escalating cyber operations, including strikes on Ukrainian infrastructure, breaches of European civilian networks, and covert attempts to influence foreign elections through disinformation and data theft.
Russian Denials and Propaganda Narrative
Moscow has consistently denied responsibility for cyber incidents, dismissing allegations as “anti‑Russian propaganda” intended to tarnish its international image. Official statements often frame accusations as part of a Western campaign to justify sanctions and military posturing, while Russian state media amplifies counter‑claims that portray the West as the aggressor in cyberspace.
Scale of Victims and Data Exposure
Der Spiegel, citing German government sources, reported that at least 300 Signal accounts linked to individuals in the political sphere were compromised during the campaign. Investigators determined that the attackers likely accessed chat histories, transmitted files, and phone numbers associated with those accounts. Affected persons were subsequently notified by the Federal Office for the Protection of the Constitution and for Information Security (BfV), and their devices were examined to prevent further data leakage.
German Response Measures
Following the breach, German authorities instructed impacted officials to reset credentials, review account activity, and monitor for atypical behavior. The BfV’s cyber‑security unit conducted forensic checks on the compromised devices to ensure that no residual malware persisted and to halt any ongoing exfiltration of sensitive information. These steps aim to mitigate reputational damage and protect ongoing diplomatic communications.
Russia’s Efforts to Control Digital Platforms
Parallel to the Signal phishing revelations, Russian authorities have pursued broader strategies to tighten domestic digital control. In February, Meta reported that Russian regulators attempted to fully block the WhatsApp messaging app as part of a campaign to limit foreign‑encrypted services and promote state‑approved alternatives. This move underscores Moscow’s dual approach: offensive cyber espionage abroad and restrictive information policies at home.
Outlook and Implications for Secure Messaging
The incident highlights the growing vulnerability of even encrypted messaging platforms to sophisticated social‑engineering attacks that target human factors rather than cryptographic weaknesses. Governments and organizations worldwide are likely to intensify user‑training programs, implement multi‑factor authentication beyond SMS codes, and explore additional verification layers for high‑risk accounts. As cyber operations remain a fixture of Russia’s hybrid strategy, continued vigilance and international cooperation will be essential to safeguard sensitive communications.

