HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Russian and Iranian Actors Compromise Thousands of Signal Accounts via Phishing Campaigns

The FBI and CISA warned that Russian and Iranian intelligence services are using sophisticated phishing messages to hijack Signal accounts belonging to U.S. officials, military personnel, journalists, and political figures. The campaign bypasses encryption by stealing credentials, exposing sensitive communications and enabling further phishing attacks.

🛡️ LiveThreat™ Intelligence · 📅 March 24, 2026· 📰 therecord.media
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
therecord.media

Russian and Iranian Actors Compromise Thousands of Signal Accounts via Phishing Campaigns

What Happened — The FBI and CISA issued alerts that Russian and Iranian intelligence services are running coordinated phishing campaigns against commercial messaging apps, most notably Signal. By masquerading as automated support notices, attackers trick users—including current and former U.S. officials, military personnel, journalists, and political figures—into linking attacker‑controlled devices or handing over verification codes, resulting in full account takeovers.

Why It Matters for TPRM

  • Compromise of high‑value individuals’ communications can expose sensitive strategic, operational, and personal data.
  • Account takeover enables lateral phishing, potentially compromising additional third‑party vendors and supply‑chain partners.
  • The threat bypasses encryption by targeting the user, highlighting the need for robust user‑education and device‑hardening controls.

Who Is Affected — Government & defense agencies, political organizations, media outlets, and any enterprise that relies on encrypted messaging for confidential communications.

Recommended Actions

  • Review and enforce multi‑factor authentication (MFA) on all messaging platforms.
  • Conduct targeted security awareness training focused on phishing impersonating support messages.
  • Verify that devices used for sensitive communications have hardened OS configurations and are managed by an approved MDM solution.
  • Update incident response playbooks to include rapid revocation of compromised messaging accounts.

Technical Notes — Attack vector: phishing messages crafted to look like legitimate support notices, prompting victims to click malicious links or provide verification codes. No vulnerability in the Signal app itself was identified; the compromise is achieved through credential theft and device linking. Data potentially exposed includes message content, contact lists, and metadata. Source: The Record

📰 Original Source
https://therecord.media/russia-iran-cyber-fbi-hacks

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.