Back to News
Espionage & Social Engineering
March 20, 20263 min read177

Russian Intelligence-Linked Hackers Run Phishing Campaigns Against WhatsApp and Signal Users

Groups like Star Blizzard, UNC5792 and UNC4221, linked to Russian intelligence, are conducting sophisticated phishing campaigns against WhatsApp and Signal users — without breaking encryption. The target is human behavior.

By Titan Layer Editorial Team

Published on March 20, 2026

Source: —

Security researchers have identified active phishing campaigns conducted by hacker groups with proven ties to Russian intelligence, specifically targeting users of encrypted messaging apps like WhatsApp and Signal. The most important conclusion is straightforward: the encryption on these platforms remains intact. Nobody is breaking the Signal protocol or WhatsApp's cipher system. The attack targets people — not technology. ## The groups behind the operations ### Star Blizzard (SEABORGIUM / TA446) Linked to Russia's FSB (Federal Security Service), Star Blizzard specializes in long-term spear-phishing campaigns against journalists, NGOs, academic researchers, former government officials and political figures in the UK, US, Baltic states and Ukraine. The group is known for patience: building relationships over weeks before launching the attack. ### UNC5792 and UNC4221 Groups tracked by Mandiant with infrastructure and technique overlaps associated with Russian intelligence operations. Focused on high-value targets: diplomats, investigative journalists, activists and officials of international organizations. ## How the attacks work ### 1. Account hijacking via verification code The attacker poses as WhatsApp or Signal support, alerting about "suspicious activity" on the account. The victim is instructed to share the SMS verification code the app just sent — exactly the code the attacker requested to migrate the account to a device under their control. ### 2. Malicious QR codes for device linking Both WhatsApp and Signal allow linking secondary devices via QR code. Attackers create fake "support" or "security verification" pages displaying a QR code — actually the linking code generated by the attacker's device. The victim scans it and unknowingly grants full real-time access to their messages. ### 3. Impersonation of known contacts Using compromised accounts of people in the victim's network, attackers send messages appearing to come from friends, colleagues or family members, requesting an "urgent favor" involving sharing a code or clicking a link. ## What the attacker gains Once with account access: real-time message monitoring, full contact list, ability to launch secondary attacks using the victim's identity, and for high-value targets, access lasting weeks or months before detection. ## How to protect yourself **Never share verification codes** — not with anyone claiming to be WhatsApp, Signal or any other platform support. No legitimate support will ever ask for this. **Check linked devices regularly** - WhatsApp: Settings → Linked Devices - Signal: Settings → Linked Devices Remove any device you don't recognize immediately. **Enable registration lock/PIN** - Signal: Settings → Account → Signal PIN - WhatsApp: Settings → Account → Two-step verification **The fundamental lesson**: Signal and WhatsApp encryption is solid. But encryption protects data in transit — it doesn't protect against a user who voluntarily grants access. The weakest link is human behavior under pressure, urgency or misplaced trust.

Article information

Editorial author:Titan Layer Editorial Team
Original source:
Original publisher:
Original author:
Original publication date:
Reference link:
Titan Layer publication date:March 20, 2026
Content type:Curated summary and editorial analysis
#whatsapp#signal#phishing#rússia#star blizzard#engenharia social#qr code

Share this article

Related Articles

Cyber Crime

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

Titan Layer
3d ago
Cyber Crime

Iranian Cyber Group Handala Targets US Troops in Bahrain

Titan Layer
5d ago
AI Fraud

Pushpaganda: New AI-Driven Campaign Abuses Browser Push Notifications

Titan Layer
4/14/2026