The Docket: FBI Links Signal Phishing Campaign to Russian Intelligence

Russian intelligence services are phishing for Signal contacts. The FBI just confirmed it.

The Docket: FBI Links Signal Phishing Campaign to Russian Intelligence

The Docket: FBI Links Signal Phishing Campaign to Russian Intelligence

The FBI has formally attributed a sophisticated Signal phishing campaign to Russian intelligence services, marking the first time U.S. law enforcement has publicly linked state-sponsored actors to targeted attacks on the encrypted messaging platform.

This escalates Signal from a privacy tool to a counterintelligence target.

The Campaign

According to the FBI's alert, the phishing operation targets individuals with potential intelligence value - journalists, activists, government officials, and cybersecurity researchers. Victims receive texts or emails impersonating Signal support, claiming their account has been compromised or will be deactivated unless they re-verify their credentials.

The phishing sites mirror Signal's branding and user interface. Victims who enter their phone number receive a legitimate Signal verification SMS (because the attackers trigger the actual account registration process). When victims enter that code on the phishing site, attackers gain full control of the Signal account.

Once inside, attackers can:

  1. Access the victim's contact list and conversation metadata.
  2. Impersonate the victim to phish their contacts (lateral movement).
  3. Intercept new messages sent to the compromised account.
  4. In some cases, exfiltrate message history if the victim had enabled cloud backups (which Signal discourages).

Why Signal?

Signal's adoption among high-value targets makes it an intelligence goldmine. Unlike consumer platforms where surveillance can be broad and passive, Signal requires active compromise because end-to-end encryption prevents interception at the network layer.

Russian intelligence services have three motives for targeting Signal specifically:

Access to dissident networks: Signal is the primary secure communication tool for Russian opposition figures, independent journalists, and human rights activists. Compromising one account provides a map of the entire network.

Government communication: U.S. and European officials increasingly use Signal for sensitive work discussions, especially after high-profile secure phone breaches. Access to these conversations has clear intelligence value.

Trust exploitation: Signal's reputation as "NSA-proof" creates a false sense of security. Users assume messages are safe and speak more freely than they would on SMS or email. That makes harvested communications more valuable.

This attribution has three legal implications:

CFAA prosecution potential: Account takeover via phishing is unauthorized access under the Computer Fraud and Abuse Act. If FBI can identify specific individuals behind the campaign, criminal charges become possible (though extradition is unlikely).

Sanctions exposure: The Treasury Department's Office of Foreign Assets Control (OFAC) could designate the infrastructure used in the campaign (domain registrars, hosting providers, payment processors) for sanctions. This has proven effective in disrupting ransomware operations.

Litigation risk for enablers: If evidence emerges that service providers (domain registrars, SSL certificate authorities) ignored abuse reports about phishing domains, victims could pursue civil claims for negligent enablement.

What Users Should Do

Signal's security model assumes you control your device and phone number. If either is compromised, encryption becomes irrelevant. To mitigate phishing risk:

  1. Enable registration lock (Settings → Account → Registration Lock). This requires a PIN to re-register your number, blocking phishing-based takeovers.
  2. Never enter Signal verification codes on external websites. Signal will never ask you to re-verify via email or web link.
  3. Verify contacts through a second channel before acting on unusual requests, even from trusted contacts (they may be compromised).
  4. Monitor linked devices (Settings → Linked Devices). Unknown sessions indicate account compromise.

The Bigger Picture

This isn't just a Signal problem. It's a reminder that no tool is immune to targeted phishing, and state-sponsored actors have the resources to defeat even strong encryption through social engineering.

When the FBI formally attributes a phishing campaign to a foreign intelligence service, it signals two things: the campaign is sophisticated enough to warrant public disclosure, and the target list includes people the U.S. government wants to protect.

If you're in that category - or adjacent to it - assume you're being targeted. Act accordingly.

Sources