Close Menu
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

Don’t Blame El Niño: The True Cause of Our Global Climate Turmoil

14/05/2026

Spyware Investigator Exposes Russia’s Covert Bid to Hijack Signal Accounts

14/05/2026

British Carrier Arrives in Norway: A New Chapter for Arctic Defense?

14/05/2026
Facebook X (Twitter) Instagram
Thursday, May 14
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home - Technology - Spyware Investigator Exposes Russia’s Covert Bid to Hijack Signal Accounts
Technology

Spyware Investigator Exposes Russia’s Covert Bid to Hijack Signal Accounts

By Admin14/05/2026No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
A spyware investigator exposed Russian government hackers trying to hijack Signal accounts
Share
Facebook Twitter LinkedIn Pinterest Email

Key Takeaways:

  • Expert Turned Target: Renowned security researcher Donncha Ó Cearbhaill became the unlikely victim of a sophisticated Signal phishing attack, leveraging the incident into a rare opportunity to investigate the attackers directly.
  • State-Sponsored Threat Uncovered: Ó Cearbhaill’s investigation linked the attack to a wider, automated campaign called “ApocalypseZ,” strongly attributed to Russian government-backed hackers targeting thousands of Signal users globally.
  • Proactive Defense is Paramount: The findings underscore the critical need for users to activate Signal’s Registration Lock feature, offering a vital layer of protection against highly persistent and advanced state-level cyber threats.

Signal Under Siege: Expert Turns the Tables on Russian Hackers in Sophisticated Phishing Blitz

In a scenario that sounds more like a cyber-thriller plot than real life, Donncha Ó Cearbhaill, a security researcher widely known for his deep investigations into spyware attacks, found himself in an extraordinary position earlier this year. For the first time, the hunter became the hunted, as he was personally targeted by hackers.

The digital ambush arrived in the familiar interface of his Signal account, an app lauded for its end-to-end encryption and privacy. The message was crafted to induce panic and urgency: “Dear User, this is Signal Security Support ChatBot. We have noticed suspicious activity on your device, which could have led to data leak,” it read. The message continued, escalating the perceived threat: “We have also detected attempts to gain access to your private data in Signal.”

The instruction that followed was the critical pivot point, designed to exploit fear and a desire for security: “To prevent this, you have to pass verification procedure, entering the verification code to Signal Security Support Chatbot. DON’T TELL ANYONE THE CODE, NOT EVEN SIGNAL EMPLOYEES.” This final admonition, while seemingly a warning, was a clever psychological trick, reinforcing the supposed legitimacy of the “security chatbot” while isolating the victim from seeking external advice.

However, for Ó Cearbhaill, who leads Amnesty International’s Security Lab, the alarm bells were not for his data, but for the clumsiness of the attack itself. He immediately recognized it as an “unwise” and transparent attempt to compromise his Signal account. Yet, instead of simply dismissing it, his seasoned investigator’s mind saw a unique opportunity – a chance to turn the tables and launch an unexpected investigation of his own.

The researcher shared with TechCrunch that, until this incident, he had “never knowingly” been the direct target of a one-click cyberattack or a phishing attempt of this specific nature. This rarity for someone so deeply entrenched in cybersecurity made the experience even more compelling. “Having the attack land in my inbox, and the chance to turn the tables on the attackers and understand more about the campaign was too good to pass up,” he recounted, highlighting the unique confluence of events that spurred his unconventional response.

Unmasking a Wider, State-Sponsored Campaign

What began as a personal incident swiftly revealed itself to be a mere sliver of a much larger and more insidious operation. The attempted attack on Ó Cearbhaill was, as it turned out, likely part of a widespread hacking campaign meticulously targeting a significant population of Signal users. The attackers’ methodology was cunningly simple yet effective: impersonate Signal’s official channels, propagate fabricated security threats, and then coerce targets into divulging critical verification codes. These codes would then allow the hackers to link the victim’s Signal account to a device under their control, effectively seizing access.

The techniques observed in this particular incident were not novel. They mirrored precisely those documented in a broader campaign that has drawn stern warnings from major international cybersecurity agencies. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), the United Kingdom’s National Cyber Security Centre (NCSC), and Dutch intelligence agencies have all raised alarms about these attacks, unequivocally attributing them to Russian government-backed spies. Signal itself has also issued public advisories cautioning its user base against similar phishing attempts. Further underscoring the severity and reach of this campaign, German news magazine Der Spiegel reported that these Russian hackers had successfully compromised several individuals within Germany, including high-profile politicians, demonstrating the strategic importance and high-value targets pursued by the group.

A screenshot of the phishing attack that targeted Donncha Ó Cearbhaill, a security researcher at Amnesty International. (Image: DONNCHA Ó Cearbhail)Image Credits:Donncha Ó Cearbhaill

The “Snowball Hypothesis” and Automated Warfare

Through a series of detailed online posts, Ó Cearbhaill disclosed that his investigation led him to conclude that he was one of more than 13,500 targets caught in this vast cyber dragnet. While he prudently refrained from revealing the intricate specifics of his investigative methodology – a tactical decision to keep his hand hidden from the adversaries – he did share invaluable insights into the campaign’s mechanics and scope.

A crucial early discovery was the presence of other targets within his professional and personal circles, including journalists he had collaborated with and a close colleague. This pattern immediately sparked what Ó Cearbhaill termed his “snowball hypothesis.” He theorized that this was not merely an opportunistic, random attack, but rather a campaign where hackers, upon successfully compromising an initial target, would then exploit that access to identify and target new potential victims. He is convinced that he himself became a target precisely because he was likely part of a group chat with someone whose Signal account had already been hacked, thereby exposing his contact information to the attackers and initiating his own chain of compromise. This “snowball” approach signifies a highly efficient and pervasive method of expanding the attack surface.

Delving deeper, the researcher managed to identify the sophisticated system underpinning these attacks, which he named “ApocalypseZ.” This system is a powerful automation engine, meticulously designed to orchestrate and execute attacks on a massive scale. It allows the hackers to inundate thousands of individuals simultaneously with these phishing attempts, dramatically reducing the need for extensive human oversight and maximizing their operational efficiency.

Further corroborating the prevailing attribution, Ó Cearbhaill also discovered that the codebase and the operator interface of “ApocalypseZ” were predominantly in Russian. Moreover, victim chats were being automatically translated into Russian, providing compelling linguistic evidence that strongly aligns with the hypothesis that this was indeed the same notorious Russian government hacking group implicated in similar, large-scale cyber campaigns globally.

Ongoing Threat and Empowering Users

Ó Cearbhaill’s vigilance continues; he reported that he is still actively monitoring the campaign and has observed the attacks persisting, indicating that the total number of targets has undoubtedly surged significantly beyond the figure he initially documented earlier in the year. This ongoing activity underscores the sustained and evolving nature of this state-sponsored threat.

Despite his deep dive into their operations, Ó Cearbhaill expressed skepticism that the hackers would attempt to target him again, suggesting they might regret their initial endeavor. With a touch of characteristic cybersecurity humor, he added: “I welcome future messages, especially if they have zero-days they would like to share.” This playful jab refers to zero-day exploits—critical security flaws unknown to vendors—which are highly prized tools in the world of cyberattacks and a common subject of his investigations.

For Signal users understandably concerned about becoming the next target of such sophisticated, state-level attacks, Ó Cearbhaill offered a crucial piece of advice: activate Registration Lock. This essential security feature empowers users to set a unique PIN for their Signal account. Once enabled, this PIN becomes mandatory for registering their phone number on any new device, effectively preventing unauthorized individuals from linking their account even if they manage to acquire a verification code through phishing or other means. It’s a simple, yet incredibly powerful deterrent against account hijackings.

Bottom Line: The harrowing experience of security researcher Donncha Ó Cearbhaill serves as a potent reminder of the escalating sophistication and relentless nature of state-sponsored cyber threats. His unique investigation, triggered by being targeted himself, not only unmasked a vast Russian-backed phishing campaign but also provided invaluable insights into their automated tools and propagation methods. While these advanced adversaries continue to probe for vulnerabilities, the incident powerfully underscores the critical role of expert vigilance and, more importantly, empowers everyday users with actionable defenses like Signal’s Registration Lock to protect their digital privacy against even the most determined nation-state actors.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.


{content}

Source: {feed_title}

Like this:

Like Loading…

Related

Accounts Exposed Government hackers hijack investigator Russian Signal spyware
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

Clio’s $500M Milestone: Anthropic’s Bold Move Ignites the AI Tech Race

14/05/2026

The AI Gatekeepers: Who Really Shapes What AI Tells You? Campbell Brown’s Crucial Insights

14/05/2026

AI’s Thirsty Future: Musk’s xAI Fuels Mississippi Data Center With 50 Unchecked Gas Turbines

14/05/2026
Leave A Reply Cancel Reply

Don't Miss
Economy & Business

Don’t Blame El Niño: The True Cause of Our Global Climate Turmoil

By Admin14/05/20260

Unlock the Editor’s Digest for freeRoula Khalaf, Editor of the FT, selects her favourite stories…

Like this:

Like Loading…

Spyware Investigator Exposes Russia’s Covert Bid to Hijack Signal Accounts

14/05/2026

British Carrier Arrives in Norway: A New Chapter for Arctic Defense?

14/05/2026

Inter Miami Coach Unveils the ‘Genius’ Behind Messi’s Match-Winning Double

14/05/2026

Who Dares Start Right-Back? Arsenal’s Radical Plan to Stop Kvaratskhelia vs. PSG

14/05/2026

Clio’s $500M Milestone: Anthropic’s Bold Move Ignites the AI Tech Race

14/05/2026

China’s AI Playbook: Why Beijing Is Redefining the Future of Work, Not Fearing It

14/05/2026

Walmart’s Corporate Reset: 1,000 Jobs Cut in Major Restructuring

14/05/2026

Scottish Premiership Title Shocker: Celtic vs. Hearts Final Day Decider Unfolds

14/05/2026

The AI Gatekeepers: Who Really Shapes What AI Tells You? Campbell Brown’s Crucial Insights

14/05/2026
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

Don’t Blame El Niño: The True Cause of Our Global Climate Turmoil

14/05/2026

Spyware Investigator Exposes Russia’s Covert Bid to Hijack Signal Accounts

14/05/2026

British Carrier Arrives in Norway: A New Chapter for Arctic Defense?

14/05/2026

Inter Miami Coach Unveils the ‘Genius’ Behind Messi’s Match-Winning Double

14/05/2026

Who Dares Start Right-Back? Arsenal’s Radical Plan to Stop Kvaratskhelia vs. PSG

14/05/2026
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
© 2026

Type above and press Enter to search. Press Esc to cancel.

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by
%d