AI & TechBusinessCybersecurityNewswireTechnology

NCSC Warns of WhatsApp and Signal Hacker Threat

Originally published on: April 3, 2026
▼ Summary

– The UK’s NCSC warns of increased targeted attacks via messaging apps like WhatsApp and Signal, attributed to Russia-based actors.
– High-risk individuals targeted include those in government, journalism, and law who have access to sensitive information or influential networks.
– Attack techniques include sending malicious links, stealing recovery codes, and impersonating contacts for social engineering.
– The advisory notes similar past activity by state-affiliated hacking groups from China and Iran.
– Recommended protections include enabling multi-factor authentication, avoiding sharing verification codes, and monitoring linked devices.

The UK’s National Cyber Security Centre has issued a significant warning about a surge in sophisticated cyberattacks targeting users of popular messaging apps like WhatsApp and Signal. These campaigns, attributed primarily to Russia-based threat actors, are designed to compromise high-profile individuals in sectors such as government, journalism, and law. The alert underscores a concerning trend where these platforms, integral to both personal and professional communication, have become prime vectors for espionage and data theft.

These attackers are not merely casting a wide net. They focus deliberately on high-risk individuals whose roles grant them access to sensitive information or influential networks. By compromising a single account, hackers can gain a foothold to access broader confidential data or launch further social engineering attacks against an individual’s contacts. The NCSC notes that similar activity has been previously linked to state-affiliated groups in China and Iran, indicating a persistent global threat landscape.

The techniques used are varied and deceptive. Cybercriminals frequently distribute malicious links or QR codes to harvest login credentials or install stealthy malware. They also impersonate trusted contacts, trick users into revealing account recovery codes, or silently add targets to compromised group chats. The Dutch intelligence service has echoed these concerns, confirming observations of Russian hackers actively targeting accounts on these encrypted services.

While the NCSC stresses that anyone can be a victim of such social engineering attacks, it provides clear guidance for bolstering digital defenses. Essential protective measures include refusing to share sensitive information or verification codes through these apps and never scanning unexpected QR codes. Enabling multi-factor authentication (MFA) adds a critical layer of security. Users should also routinely audit their account settings, checking for unfamiliar linked devices and scrutinizing group chat participants.

For professional communications, the advice is to use corporately managed devices and messaging services where possible, adhering strictly to organizational security policies. As Andy Ward, a senior executive at Absolute Security, observes, the deep integration of these apps into daily life makes them attractive targets. He emphasizes that proactive monitoring of devices and applications is crucial for threat prevention, alongside having robust plans for recovery when breaches inevitably occur. This alert serves as a stark reminder that vigilance and disciplined security hygiene are non-negotiable in protecting valuable personal and professional data.

(Source: Infosecurity Magazine)

Topics

targeted cyber attacks 98% messaging app vulnerabilities 96% high-risk individuals 94% state-sponsored hacking 92% social engineering 90% ncsc warning 88% attack techniques 86% cybersecurity advice 84% multi-factor authentication 82% international intelligence alerts 80%