Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Feb 19, 2025Ravie LakshmananCell Safety / Cyber Espionage

A number of Russia-aligned menace actors have been noticed concentrating on people of curiosity through the privacy-focused messaging app Sign to achieve unauthorized entry to their accounts.

“Probably the most novel and broadly used approach underpinning Russian-aligned makes an attempt to compromise Sign accounts is the abuse of the app’s official ‘linked units’ function that permits Sign for use on a number of units concurrently,” the Google Menace Intelligence Group (GTIG) said in a report.

Within the assaults noticed by the tech large’s menace intelligence groups, the menace actors, together with one it is monitoring as UNC5792, have resorted to malicious QR codes that, when scanned, will hyperlink a sufferer’s account to an actor-controlled Sign occasion.

Consequently, future messages get delivered synchronously to each the sufferer and the menace actor in real-time, thereby granting menace actors a persistent technique to listen in on the sufferer’s conversations. Google stated UAC-0195 partially overlaps with a hacking group generally known as UAC-0195.

Cybersecurity

These QR codes are identified to masquerade as group invitations, safety alerts, or official machine pairing directions from the Sign web site. Alternatively, the malicious device-linking QR codes have been discovered to be embedded in phishing pages that purport to be specialised functions utilized by the Ukrainian army.

“UNC5792 has hosted modified Sign group invites on actor-controlled infrastructure designed to look an identical to a official Sign group invite,” Google stated.

One other menace actor linked to the concentrating on of Sign is UNC4221 (aka UAC-0185), which has singled out Sign accounts utilized by Ukrainian army personnel by way of a customized phishing equipment that is designed to imitate sure features of the Kropyva software utilized by the Armed Forces of Ukraine for artillery steering.

Additionally used is a light-weight JavaScript payload dubbed PINPOINT that may acquire fundamental consumer info and geolocation information by way of phishing pages.

Exterior of UNC5792 and UNC4221, among the different adversarial collectives which have educated their sights on Sign are Sandworm (aka APT44), which has utilized a Home windows Batch script named WAVESIGN; Turla, which has operated a light-weight PowerShell script; and UNC1151, which has put to make use of the Robocopy utility to exfiltrate Sign messages from an contaminated desktop.

Sign has launched new updates for Android and iOS with hardened options to safe customers in opposition to such phishing efforts. Customers are really helpful to replace to the most recent model to allow these options.

The disclosure from Google comes slightly over a month after the Microsoft Menace Intelligence group attributed the Russian menace actor generally known as Star Blizzard to a spear-phishing marketing campaign that leverages an analogous device-linking function to hijack WhatsApp accounts.

Final week, Microsoft and Volexity additionally revealed that a number of Russian menace actors are making the most of a method known as machine code phishing to log into victims’ accounts by concentrating on them through messaging apps like WhatsApp, Sign, and Microsoft Groups.

“The operational emphasis on Sign from a number of menace actors in current months serves as an necessary warning for the rising menace to safe messaging functions that’s sure to accentuate within the near-term,” Google stated.

Cybersecurity

“As mirrored in vast ranging efforts to compromise Sign accounts, this menace to safe messaging functions just isn’t restricted to distant cyber operations equivalent to phishing and malware supply, but additionally critically consists of close-access operations the place a menace actor can safe temporary entry to a goal’s unlocked machine.”

The disclosure additionally follows the invention of a brand new SEO (web optimization) poisoning marketing campaign that makes use of faux obtain pages impersonating widespread functions like Sign, LINE, Gmail, and Google Translate to ship backdoored executables geared toward Chinese language-speaking customers.

“The executables delivered by way of faux obtain pages comply with a constant execution sample involving non permanent file extraction, course of injection, safety modifications, and community communications,” Hunt.io said, including the samples exhibit infostealer-like performance related to a malware pressure known as MicroClip.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.

Leave a Reply