We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.
-
@Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.
@voxel nope
-
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.
To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.
@signalapp
Thank you for explanations.1. When will mere users be able to detach Signal session from the mobile device?
This single functionality (doable for versed hackers but not for the general public) would stop such scams for high value targets like journalists, who would simply use a single-purpose wifi only desktop/tablet.
-
Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?
@unaegeli @signalapp One is an in-app prompt. The other is a message, text or email. They don't look anything alike.
-
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.
To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.
@signalapp those attacks.would've not.been successful if you weren't a #proprietary, #centralized, #SingleVendor / #SingleProvider "solution" that doesn't do #SelfCustoy of all the.keys nor allows for #SelfHosting nor demands #PII like #PhoneNumbers that can be leveraged for that.
- You know what I need to use @monocles / #monoclesChat or @gajim / #XMPP+#OMEMO?
- Internet connection and an account on any server.
Can't #phish if one doesn't have credentials for #phishing attacks ffs!
- Can't get #phished if noone demands, stores, process or even demands such details in the first place!
Also which #Government is that incompetent to not be able to setup their own comms?
- You know what I need to use @monocles / #monoclesChat or @gajim / #XMPP+#OMEMO?
-
These attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent “Signal Support Bot”) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.
@signalapp yes, and you have control over all the #Signal usernames, so it's your failing to prevent thode that happen inside your platform!
- I know that like any decent system you can block keywords and strings from usernames, display names and so forth.
- If not tuey ou truly are criminally incompetent!
- I know that like any decent system you can block keywords and strings from usernames, display names and so forth.
-
To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.
We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.
@signalapp THERE IS NO LEGITIMATE REASON FOR #Signal TO DEMAND A #PhoneNumber (= #PII by circumstances if not mandatory doxxing to the governments aka. "#KYC")…
- so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even
cock.liof all places…
- so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even
-
@signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.
@ExcelAnalytics @signalapp not only that, the entire concept of demaning a #PhoneNumber to use #Signal is inherently and irredeemably wrong to begin with!
-
@signalapp as careful as this message is, I think it could be improved. If someone goes to a web page and get phished by being asked to type it into the page, the message will not dter them because it's not someone "asking for the code".
I think the message should say something about where it's intended to be used.
-
"in a stunning development today, a random mastodon user showed they were able to take over Signal's Signal account. details of the hack remain unclear"
@benroyce @FQQD I know the details:
@signalapp are criminally incompetent like #EncroChat at best if not a #HoneyPot like #ANØM aka. #OperationIronside aka. #OperationTrøjanShield...
-
@FQQD @signalapp quick GET 'EM
-
@Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.
@voxel @Lizette603_23 @signalapp they refuse to acknowledge that it's their failure by design…
-
@signalapp THERE IS NO LEGITIMATE REASON FOR #Signal TO DEMAND A #PhoneNumber (= #PII by circumstances if not mandatory doxxing to the governments aka. "#KYC")…
- so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even
cock.liof all places…
@kkarhan@infosec.space since i’ve started hosting services for people, i came to the conclusion that the only thing you will need is an email, and only when there is no other option to reach out to the user.
let’s make it clear to everyone: phone numbers should only be shared to people you trust and nobody else
- so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even
-
@voxel @Lizette603_23 @signalapp they refuse to acknowledge that it's their failure by design…
@voxel @Lizette603_23 @signalapp instead #Signal continues to peddle their #Shitcoin to this day…
https://www.youtube.com/watch?v=0DSGq9FQKU4 video via @techlore@social.lol / @techlore@techlore.tv / #TechLore
-
@signalapp "SMS codes" sounds like a you problem, though.
@ariarhythmic @signalapp yes, it it #Signal's sole fault!
- Because this attack vector doesn't exist in any halfway decent messenger App / system!
-
@signalapp Since Signal always asks for a PIN code for backups, it seems logical that threat actors are exploiting this behavior to trick users.
@adulau I think this is a deliberate #Govware #Backdoor by @signalapp since others don't do that shite yet offer encrypted backups anyway…
-
@signalapp You know how you could solve that? Stop taking users' phone numbers, and especially stop using it for verification. EZPZ.
@DekOfTheYautja PRECISELY THAT!
- Everyone with two braincells should come to the conclusion that @signalapp / #Signal is.just a successor project to #MINERVA / #Rubikon (aka. #CryptoAG) and #OperationIronside / #OperationTrøjanShield.
- Because otherwise they would've been already shutdown like #EncroChat and not "let run" like #ANØM…
- Everyone with two braincells should come to the conclusion that @signalapp / #Signal is.just a successor project to #MINERVA / #Rubikon (aka. #CryptoAG) and #OperationIronside / #OperationTrøjanShield.
-
While we build robust technical safeguards, user vigilance is ultimately the best defense against phishing. We will continue to work on mitigating these risks via interface design and signposting throughout the app. In the meantime, please stay alert, and never share your SMS verification code or Signal PIN with anyone.
@signalapp It would probably help if Signal itself didn't use what looks like a real conversation or story to communicate to the user. It legitimizes phishing attacks like these. And they're annoying features regardless.
-
@signalapp yes, and you have control over all the #Signal usernames, so it's your failing to prevent thode that happen inside your platform!
- I know that like any decent system you can block keywords and strings from usernames, display names and so forth.
- If not tuey ou truly are criminally incompetent!
@signalapp@mastodon.world @kkarhan@infosec.space I then hereby register myself as incompetent.
First I will just block "Signal Support".
Then I will block all with "Signal" in it, and be hated by "Rescue Signal Inc.", "Weak Signal Detector" and "Signal Noise Ratio". But people will get over it.
Then I will also block Signаl, which looks the same but is encoded differently. Damn russian hackers with their alphabet.
Next Turkish hackers will succeed with their phishing campaign using the name Sıgnal, so I will block those.
And after all this I will sadly witness that people even fall for Signa|, S!gnal, Singal, Sagnil and Signel, so I will block all those too.
In the end the journalist "Jesse Singal" will sue me to death because I blocked them.
I really know no good way to avoid this. Best I can think of is having a special icon only the real Signal support can use - but then people who do not know about it will keep falling for it. - I know that like any decent system you can block keywords and strings from usernames, display names and so forth.
-
Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?
@unaegeli
-That's a different code
-It's very clearly a popup, and not in a chat
-To abuse it, one would already need access to the account, i.e. through having completed the other attackI feel like that reminder is distinct enough as it is
@signalapp -
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.
To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.
@signalapp could you enable Yubikey support for MFA with signal accounts ? A Yubikey is phishing resistant and would stop this kind of attack if a user set it up.