A lot of people seem to be confused so to clear up: They haven’t broken encryption. They are phishing using malicious QR codes.

Russia-backed hacking groups have developed techniques to compromise encrypted messaging services, including Signal, WhatsApp and Telegram, placing journalists, politicians and activists of interest to the Russian intelligence service at potential risk.

Google Threat Intelligence Group disclosed today that Russia-backed hackers had stepped up attacks on Signal Messenger accounts to access sensitive government and military communications relating to the war in Ukraine.

Analysts predict it is only a matter of time before Russia starts deploying hacking techniques against non-military Signal users and users of other encrypted messaging services, including WhatsApp and Telegram.

  • Draconic NEO@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    31
    ·
    edit-2
    8 hours ago

    This is a Phishing attack, just so we’re clear, they haven’t broken the encryption. They gain access by tricking you into clicking malicious links or scanning fake QR codes. As long as you stay vigilant you should be fine, make sure to warn other people in your life though who might not be as keen on this though, they can easily be compromised, and if they share conversations with you it can indirectly affect you if they are.

  • evilcultist@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    68
    ·
    9 hours ago

    To be clear: these are phishing techniques. They aren’t breaking the encryption, they’re getting the user to let them in.

    • fxomt@lemmy.dbzer0.comOPM
      link
      fedilink
      arrow-up
      6
      ·
      9 hours ago

      Yes; they are not breaking it, but they have developed malicious QR codes, which the user expects to be the link device QR, but is actually giving them access to their messages.

      Russia-backed hackers are attempting to compromise Signal’s “linked devices” capability, which allows Signal users to link their messaging account to multiple devices, including phones and laptops, using a quick response (QR) code.

      Google threat analysts report that Russia-linked threat actors have developed malicious QR codes that, when scanned, will give the threat actor real-time access to the victim’s messages without having to compromise the victim’s phone or computer.

  • Miles O'Brien@startrek.website
    link
    fedilink
    English
    arrow-up
    19
    ·
    9 hours ago

    Before I even read: it’s phishing, and it’s nothing new. There’s no evidence supporting anyone has broken this level of E2EE.

    After reading: oh look. Surprise. This is my surprised face.

    This just screams of “we want backdoors to be forced into encrypted things so we have even more control”

  • empireOfLove2@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    11
    ·
    8 hours ago

    Security is only as good as it’s weakest link, which is almost always the end user. These attacks do not compromise Signal the protocol (e.g seeing in-flight data), they are focusing on hijacking account information to gain access.