Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

Scheduled Pinned Locked Moved Uncategorized
98 Posts 50 Posters 174 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • signalapp@mastodon.worldS signalapp@mastodon.world

    These attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent “Signal Support Bot”) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.

    sonjdol@ohai.socialS This user is from outside of this forum
    sonjdol@ohai.socialS This user is from outside of this forum
    sonjdol@ohai.social
    wrote last edited by
    #9

    @signalapp this might be worth a push message to all users

    1 Reply Last reply
    0
    • signalapp@mastodon.worldS signalapp@mastodon.world

      To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

      We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

      unaegeli@swiss.socialU This user is from outside of this forum
      unaegeli@swiss.socialU This user is from outside of this forum
      unaegeli@swiss.social
      wrote last edited by
      #10

      @signalapp

      Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

      joelvanderwerf@mastodon.socialJ solitha@mastodon.socialS distrowatch@mastodon.socialD kainisenni@vocalounge.cafeK dec23k@mastodon.ieD 6 Replies Last reply
      0
      • P patricus@gts.posix.live

        @signalapp how to move signal account from a phone to an other? just a question.

        tedstechtips@mas.toT This user is from outside of this forum
        tedstechtips@mas.toT This user is from outside of this forum
        tedstechtips@mas.to
        wrote last edited by
        #11

        @patricus @signalapp https://support.signal.org/hc/en-us/articles/10074659364122-Backups-and-Device-Transfers-on-Signal

        avitus@ioc.exchangeA 1 Reply Last reply
        0
        • signalapp@mastodon.worldS signalapp@mastodon.world

          While we build robust technical safeguards, user vigilance is ultimately the best defense against phishing. We will continue to work on mitigating these risks via interface design and signposting throughout the app. In the meantime, please stay alert, and never share your SMS verification code or Signal PIN with anyone.

          Just a moment...

          favicon

          (support.signal.org)

          excelanalytics@mastodon.worldE This user is from outside of this forum
          excelanalytics@mastodon.worldE This user is from outside of this forum
          excelanalytics@mastodon.world
          wrote last edited by
          #12

          @signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.

          jakobnitschke@mastodon.socialJ kkarhan@infosec.spaceK 2 Replies Last reply
          0
          • unaegeli@swiss.socialU unaegeli@swiss.social

            @signalapp

            Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

            joelvanderwerf@mastodon.socialJ This user is from outside of this forum
            joelvanderwerf@mastodon.socialJ This user is from outside of this forum
            joelvanderwerf@mastodon.social
            wrote last edited by
            #13

            @unaegeli @signalapp My guess: the reminder is a pop-up dialog. It's not a signal message, email, or text.

            I, too, would like to hear Signal's answer to this question.

            1 Reply Last reply
            0
            • unaegeli@swiss.socialU unaegeli@swiss.social

              @signalapp

              Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

              solitha@mastodon.socialS This user is from outside of this forum
              solitha@mastodon.socialS This user is from outside of this forum
              solitha@mastodon.social
              wrote last edited by
              #14

              @unaegeli @signalapp I was just thinking of this.

              It sounds like Signal is fairly unique in this setup. We're constantly being bombarded with verification requests, and it can be easy to forget one app works differently.

              pupwrafie@bark.lgbtP 1 Reply Last reply
              0
              • fqqd@chaos.socialF fqqd@chaos.social

                @signalapp you dum dum you just publicly shared it

                benroyce@mastodon.socialB This user is from outside of this forum
                benroyce@mastodon.socialB This user is from outside of this forum
                benroyce@mastodon.social
                wrote last edited by
                #15

                @FQQD @signalapp

                😂

                "in a stunning development today, a random mastodon user showed they were able to take over Signal's Signal account. details of the hack remain unclear"

                kkarhan@infosec.spaceK 1 Reply Last reply
                0
                • fqqd@chaos.socialF fqqd@chaos.social

                  @signalapp you dum dum you just publicly shared it

                  zrb@social.hildebrind.spaceZ This user is from outside of this forum
                  zrb@social.hildebrind.spaceZ This user is from outside of this forum
                  zrb@social.hildebrind.space
                  wrote last edited by
                  #16

                  @FQQD @signalapp quick GET 'EM

                  kkarhan@infosec.spaceK 1 Reply Last reply
                  0
                  • signalapp@mastodon.worldS signalapp@mastodon.world

                    We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                    To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                    lizette603_23@mastodon.socialL This user is from outside of this forum
                    lizette603_23@mastodon.socialL This user is from outside of this forum
                    lizette603_23@mastodon.social
                    wrote last edited by
                    #17

                    @signalapp nobody should use Signal

                    voxel@infosec.spaceV avitus@ioc.exchangeA 2 Replies Last reply
                    0
                    • lizette603_23@mastodon.socialL lizette603_23@mastodon.social

                      @signalapp nobody should use Signal

                      voxel@infosec.spaceV This user is from outside of this forum
                      voxel@infosec.spaceV This user is from outside of this forum
                      voxel@infosec.space
                      wrote last edited by
                      #18

                      @Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.

                      lizette603_23@mastodon.socialL kkarhan@infosec.spaceK 2 Replies Last reply
                      0
                      • excelanalytics@mastodon.worldE excelanalytics@mastodon.world

                        @signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.

                        jakobnitschke@mastodon.socialJ This user is from outside of this forum
                        jakobnitschke@mastodon.socialJ This user is from outside of this forum
                        jakobnitschke@mastodon.social
                        wrote last edited by
                        #19

                        @ExcelAnalytics @signalapp

                        Thank you for pointing this out

                        1 Reply Last reply
                        0
                        • signalapp@mastodon.worldS signalapp@mastodon.world

                          We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                          To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                          ariarhythmic@ohai.socialA This user is from outside of this forum
                          ariarhythmic@ohai.socialA This user is from outside of this forum
                          ariarhythmic@ohai.social
                          wrote last edited by
                          #20

                          @signalapp "SMS codes" sounds like a you problem, though.

                          kkarhan@infosec.spaceK 1 Reply Last reply
                          0
                          • signalapp@mastodon.worldS signalapp@mastodon.world

                            We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                            To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                            adulau@infosec.exchangeA This user is from outside of this forum
                            adulau@infosec.exchangeA This user is from outside of this forum
                            adulau@infosec.exchange
                            wrote last edited by
                            #21

                            @signalapp Since Signal always asks for a PIN code for backups, it seems logical that threat actors are exploiting this behavior to trick users.

                            kkarhan@infosec.spaceK 1 Reply Last reply
                            0
                            • solitha@mastodon.socialS solitha@mastodon.social

                              @unaegeli @signalapp I was just thinking of this.

                              It sounds like Signal is fairly unique in this setup. We're constantly being bombarded with verification requests, and it can be easy to forget one app works differently.

                              pupwrafie@bark.lgbtP This user is from outside of this forum
                              pupwrafie@bark.lgbtP This user is from outside of this forum
                              pupwrafie@bark.lgbt
                              wrote last edited by
                              #22

                              @solitha
                              I mean it's hard for some non technical users to make them understand what is the "trusted context" and what is not I suppose?

                              I mean we had that with mail for years, people should know to check the senders mail, yet still Phishing attacks are often successful.
                              @unaegeli @signalapp

                              solitha@mastodon.socialS 1 Reply Last reply
                              0
                              • signalapp@mastodon.worldS signalapp@mastodon.world

                                We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                                To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                                dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
                                dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
                                dekoftheyautja@social.vivaldi.net
                                wrote last edited by
                                #23

                                @signalapp You know how you could solve that? Stop taking users' phone numbers, and especially stop using it for verification. EZPZ.

                                kkarhan@infosec.spaceK tknarr@mstdn.socialT avitus@ioc.exchangeA 3 Replies Last reply
                                0
                                • signalapp@mastodon.worldS signalapp@mastodon.world

                                  To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

                                  We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

                                  izby@mastodon.socialI This user is from outside of this forum
                                  izby@mastodon.socialI This user is from outside of this forum
                                  izby@mastodon.social
                                  wrote last edited by
                                  #24

                                  @signalapp

                                  You should add the ability to sign up with email. I'm not sure that Russian users can log in with a code from SMS.

                                  avitus@ioc.exchangeA 1 Reply Last reply
                                  0
                                  • voxel@infosec.spaceV voxel@infosec.space

                                    @Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.

                                    lizette603_23@mastodon.socialL This user is from outside of this forum
                                    lizette603_23@mastodon.socialL This user is from outside of this forum
                                    lizette603_23@mastodon.social
                                    wrote last edited by
                                    #25

                                    @voxel nope

                                    1 Reply Last reply
                                    0
                                    • signalapp@mastodon.worldS signalapp@mastodon.world

                                      We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                                      To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                                      ohir@social.vivaldi.netO This user is from outside of this forum
                                      ohir@social.vivaldi.netO This user is from outside of this forum
                                      ohir@social.vivaldi.net
                                      wrote last edited by
                                      #26

                                      @signalapp
                                      Thank you for explanations.

                                      1. When will mere users be able to detach Signal session from the mobile device?

                                      This single functionality (doable for versed hackers but not for the general public) would stop such scams for high value targets like journalists, who would simply use a single-purpose wifi only desktop/tablet.

                                      avitus@ioc.exchangeA 1 Reply Last reply
                                      0
                                      • unaegeli@swiss.socialU unaegeli@swiss.social

                                        @signalapp

                                        Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

                                        distrowatch@mastodon.socialD This user is from outside of this forum
                                        distrowatch@mastodon.socialD This user is from outside of this forum
                                        distrowatch@mastodon.social
                                        wrote last edited by
                                        #27

                                        @unaegeli @signalapp One is an in-app prompt. The other is a message, text or email. They don't look anything alike.

                                        gunstick@mastodon.opencloud.luG 1 Reply Last reply
                                        0
                                        • signalapp@mastodon.worldS signalapp@mastodon.world

                                          We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                                          To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.space
                                          wrote last edited by
                                          #28

                                          @signalapp those attacks.would've not.been successful if you weren't a #proprietary, #centralized, #SingleVendor / #SingleProvider "solution" that doesn't do #SelfCustoy of all the.keys nor allows for #SelfHosting nor demands #PII like #PhoneNumbers that can be leveraged for that.

                                          • You know what I need to use @monocles / #monoclesChat or @gajim / #XMPP+#OMEMO?
                                            • Internet connection and an account on any server.

                                          Can't #phish if one doesn't have credentials for #phishing attacks ffs!

                                          • Can't get #phished if noone demands, stores, process or even demands such details in the first place!

                                          Also which #Government is that incompetent to not be able to setup their own comms?

                                          1 Reply Last reply
                                          1
                                          0
                                          • R relay@relay.infosec.exchange shared this topic
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups