News: 1764070334

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

CISA warns spyware crews are breaking into Signal and WhatsApp accounts

(2025/11/25)


CISA has warned that state-backed snoops and cyber-mercenaries are actively abusing commercial spyware to break into Signal and WhatsApp accounts, hijack devices, and quietly rummage through the phones of what the agency calls "high-value" users.

In [1]an alert published Monday , the US government's cyber agency said it's tracking multiple miscreants that are using a mix of phishing, bogus QR codes, malicious app impersonation, and, in some cases, full-blown zero-click exploits to compromise messaging apps which most people assume are safe.

The agency says the activity it's seeing suggests an increasing focus on "high-value" individuals – everyone from current and former senior government, military, and political officials to civil society groups across the US, the Middle East, and Europe. In many of the campaigns, attackers delivered spyware first and asked questions later, using the foothold to deploy more payloads and deepen their access.

[2]

"CISA is aware of multiple cyber threat actors actively leveraging commercial spyware to target users of mobile messaging applications," the agency said. "These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim's messaging app, facilitating the deployment of additional malicious payloads that can further compromise the victim's mobile device."

[3]

[4]

The campaigns CISA flags in its bulletin show attackers doing what they do best: sidestepping encryption entirely by spoofing apps, abusing account features, and exploiting the phones underneath them.

For example, Google's Threat Intelligence Group in February [5]detailed how multiple Russia-aligned crews, including Sandworm and Turla, attempted to snoop on Signal users by abusing the app's "linked devices" feature. By coaxing victims into scanning a tampered QR code, the operators could quietly add a second, attacker-controlled device to the account. Once paired, new messages flowed to both ends in real time, letting Moscow's finest eavesdrop.

[6]FCC guts post-Salt Typhoon telco rules despite ongoing espionage risk

[7]Russia-linked crooks bought a bank for Christmas to launder cyber loot

[8]Amazon security boss: Hostile countries use cyber targeting for physical military strikes

[9]Chinese spies told Claude to break into about 30 critical orgs. Some attacks succeeded

CISA also pointed to a separate line of Android exploitation work, [10]spearheaded by Palo Alto Networks' Unit 42 , in which commercial-grade spyware known as LANDFALL was delivered to Samsung Galaxy devices. [11]Uncovered earlier this month , this campaign combined a Samsung vulnerability with a zero-click WhatsApp exploit, allowing operators to slip a malicious image into a target's inbox and have the device compromise itself on receipt.

Not all the activity relied on exploits. Several of the campaigns CISA cites – including ProSpy and ToSpy – made headway by impersonating familiar apps such as Signal and TikTok, hoovering up chat data, recordings, and files once it landed on a device. Meanwhile, Zimperium's researchers [12]identified ClayRat, an Android spyware family that has been seeded across Russia via counterfeit Telegram channels and lookalike phishing sites masquerading as WhatsApp, TikTok, and YouTube.

[13]

CISA's alert lands amid heightened scrutiny of commercial spyware vendors. The US recently barred NSO Group from targeting WhatsApp users with Pegasus, and earlier this year, the US House of Representatives banned WhatsApp from staff devices after a string of security concerns. This move reflects the uncomfortable reality behind CISA's warning: attackers aren't breaking encrypted messengers, they're simply burrowing under them. ®

Get our [14]Tech Resources



[1] https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-target-users-messaging-applications

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aSXgqwbWphp7PPTXqkAvTwAAAAw&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aSXgqwbWphp7PPTXqkAvTwAAAAw&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aSXgqwbWphp7PPTXqkAvTwAAAAw&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/

[6] https://www.theregister.com/2025/11/24/fcc_salt_typhoon_rules/

[7] https://www.theregister.com/2025/11/21/russia_cybercrime_bank_purchase/

[8] https://www.theregister.com/2025/11/19/amazon_cso_warfare_cyber_kinetic/

[9] https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/

[10] https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/

[11] https://www.theregister.com/2025/11/07/landfall_spyware_samsung_0days/

[12] https://zimperium.com/blog/clayrat-a-new-android-spyware-targeting-russia

[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aSXgqwbWphp7PPTXqkAvTwAAAAw&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[14] https://whitepapers.theregister.com/



Somebody tell the FCC

Eclectic Man

https://www.theregister.com/2025/11/24/fcc_salt_typhoon_rules/

"The Federal Communications Commission (FCC) has scrapped a set of telecom cybersecurity rules introduced after the Salt Typhoon espionage campaign, reversing course on measures designed to stop state-backed snoops from slipping back into America's networks."

Hey, guys, how about a co-ordinated national cyber security response protecting comms and IT infrastructure?

Anyone? Anyone at all?

Re: Somebody tell the FCC

The Man Who Fell To Earth

You are asking for a coherent coordinated response from an incoherent Administration?

Re: Somebody tell the FCC

Blitheringeejit

You're asking for a response which protects US national interests from an administration which derides constitutional accountability?

FTFY

Cornishinretirement

Interesting concept "abusing commercial spyware". I thought spyware was pretty much an abuse as it is.

Alumoi

Spyware is OK if used by the good guys. Now, depending on your contry of origin, the definition of 'good guys' may be different.

Anonymous Coward

Signal anyone ?

Anonymous Coward

Sure, follow this link to connect https://iamafoolwhowillclickonrandomlinks.invalid/exploit/

Signal itself is (probably) pretty secure, but as usual, if the bad guys "own" the device there is little that Signal can do.

App Store Security Threats in 2025

Taliesinawen

“ [1]Mobile devices are now the primary gateway to the digital world . From banking to healthcare, users rely on apps for critical daily tasks. Yet, this convenience has become a double-edged sword.”

How about using a locked-down device with a read-only switch set for normal usage and not download from an apps store. I mean every time you install an app - it's game over as far as security is concerned.

[1] https://securityboulevard.com/2025/06/app-store-security-threats-in-2025-why-hackers-target-mobile-ecosystems/

Re: App Store Security Threats in 2025

cd

How about a phone not manufactured by a company that makes most of its profits off info-dealing?

She's genuinely bogus.