Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
77 Indlæg 49 Posters 1 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • fqqd@chaos.socialF fqqd@chaos.social

    @signalapp you dum dum you just publicly shared it

    zrb@social.hildebrind.spaceZ This user is from outside of this forum
    zrb@social.hildebrind.spaceZ This user is from outside of this forum
    zrb@social.hildebrind.space
    wrote sidst redigeret af
    #16

    @FQQD @signalapp quick GET 'EM

    kkarhan@infosec.spaceK 1 Reply Last reply
    0
    • signalapp@mastodon.worldS signalapp@mastodon.world

      We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

      To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

      lizette603_23@mastodon.socialL This user is from outside of this forum
      lizette603_23@mastodon.socialL This user is from outside of this forum
      lizette603_23@mastodon.social
      wrote sidst redigeret af
      #17

      @signalapp nobody should use Signal

      voxel@infosec.spaceV 1 Reply Last reply
      0
      • lizette603_23@mastodon.socialL lizette603_23@mastodon.social

        @signalapp nobody should use Signal

        voxel@infosec.spaceV This user is from outside of this forum
        voxel@infosec.spaceV This user is from outside of this forum
        voxel@infosec.space
        wrote sidst redigeret af
        #18

        @Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.

        lizette603_23@mastodon.socialL kkarhan@infosec.spaceK 2 Replies Last reply
        0
        • signalapp@mastodon.worldS signalapp@mastodon.world

          We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

          To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

          scathach@stereophonic.spaceS This user is from outside of this forum
          scathach@stereophonic.spaceS This user is from outside of this forum
          scathach@stereophonic.space
          wrote sidst redigeret af
          #19
          @signalapp These attacks wouldn't be possible if you stopped requiring phone numbers
          christmastree@mastodon.socialC 1 Reply Last reply
          0
          • excelanalytics@mastodon.worldE excelanalytics@mastodon.world

            @signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.

            jakobnitschke@mastodon.socialJ This user is from outside of this forum
            jakobnitschke@mastodon.socialJ This user is from outside of this forum
            jakobnitschke@mastodon.social
            wrote sidst redigeret af
            #20

            @ExcelAnalytics @signalapp

            Thank you for pointing this out

            1 Reply Last reply
            0
            • signalapp@mastodon.worldS signalapp@mastodon.world

              We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

              To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

              ariarhythmic@ohai.socialA This user is from outside of this forum
              ariarhythmic@ohai.socialA This user is from outside of this forum
              ariarhythmic@ohai.social
              wrote sidst redigeret af
              #21

              @signalapp "SMS codes" sounds like a you problem, though.

              kkarhan@infosec.spaceK 1 Reply Last reply
              0
              • signalapp@mastodon.worldS signalapp@mastodon.world

                We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                adulau@infosec.exchangeA This user is from outside of this forum
                adulau@infosec.exchangeA This user is from outside of this forum
                adulau@infosec.exchange
                wrote sidst redigeret af
                #22

                @signalapp Since Signal always asks for a PIN code for backups, it seems logical that threat actors are exploiting this behavior to trick users.

                kkarhan@infosec.spaceK 1 Reply Last reply
                0
                • solitha@mastodon.socialS solitha@mastodon.social

                  @unaegeli @signalapp I was just thinking of this.

                  It sounds like Signal is fairly unique in this setup. We're constantly being bombarded with verification requests, and it can be easy to forget one app works differently.

                  pupwrafie@bark.lgbtP This user is from outside of this forum
                  pupwrafie@bark.lgbtP This user is from outside of this forum
                  pupwrafie@bark.lgbt
                  wrote sidst redigeret af
                  #23

                  @solitha
                  I mean it's hard for some non technical users to make them understand what is the "trusted context" and what is not I suppose?

                  I mean we had that with mail for years, people should know to check the senders mail, yet still Phishing attacks are often successful.
                  @unaegeli @signalapp

                  solitha@mastodon.socialS 1 Reply Last reply
                  0
                  • signalapp@mastodon.worldS signalapp@mastodon.world

                    We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                    To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                    dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
                    dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
                    dekoftheyautja@social.vivaldi.net
                    wrote sidst redigeret af
                    #24

                    @signalapp You know how you could solve that? Stop taking users' phone numbers, and especially stop using it for verification. EZPZ.

                    kkarhan@infosec.spaceK tknarr@mstdn.socialT 2 Replies Last reply
                    0
                    • signalapp@mastodon.worldS signalapp@mastodon.world

                      To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

                      We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

                      izby@mastodon.socialI This user is from outside of this forum
                      izby@mastodon.socialI This user is from outside of this forum
                      izby@mastodon.social
                      wrote sidst redigeret af
                      #25

                      @signalapp

                      You should add the ability to sign up with email. I'm not sure that Russian users can log in with a code from SMS.

                      1 Reply Last reply
                      0
                      • voxel@infosec.spaceV voxel@infosec.space

                        @Lizette603_23 @signalapp Please stay kind and on topic, alright? Signal is open for feedback in their Discourse Forum.

                        lizette603_23@mastodon.socialL This user is from outside of this forum
                        lizette603_23@mastodon.socialL This user is from outside of this forum
                        lizette603_23@mastodon.social
                        wrote sidst redigeret af
                        #26

                        @voxel nope

                        1 Reply Last reply
                        0
                        • signalapp@mastodon.worldS signalapp@mastodon.world

                          We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                          To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                          ohir@social.vivaldi.netO This user is from outside of this forum
                          ohir@social.vivaldi.netO This user is from outside of this forum
                          ohir@social.vivaldi.net
                          wrote sidst redigeret af
                          #27

                          @signalapp
                          Thank you for explanations.

                          1. When will mere users be able to detach Signal session from the mobile device?

                          This single functionality (doable for versed hackers but not for the general public) would stop such scams for high value targets like journalists, who would simply use a single-purpose wifi only desktop/tablet.

                          1 Reply Last reply
                          0
                          • unaegeli@swiss.socialU unaegeli@swiss.social

                            @signalapp

                            Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

                            distrowatch@mastodon.socialD This user is from outside of this forum
                            distrowatch@mastodon.socialD This user is from outside of this forum
                            distrowatch@mastodon.social
                            wrote sidst redigeret af
                            #28

                            @unaegeli @signalapp One is an in-app prompt. The other is a message, text or email. They don't look anything alike.

                            1 Reply Last reply
                            0
                            • signalapp@mastodon.worldS signalapp@mastodon.world

                              We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                              To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                              kkarhan@infosec.spaceK This user is from outside of this forum
                              kkarhan@infosec.spaceK This user is from outside of this forum
                              kkarhan@infosec.space
                              wrote sidst redigeret af
                              #29

                              @signalapp those attacks.would've not.been successful if you weren't a #proprietary, #centralized, #SingleVendor / #SingleProvider "solution" that doesn't do #SelfCustoy of all the.keys nor allows for #SelfHosting nor demands #PII like #PhoneNumbers that can be leveraged for that.

                              • You know what I need to use @monocles / #monoclesChat or @gajim / #XMPP+#OMEMO?
                                • Internet connection and an account on any server.

                              Can't #phish if one doesn't have credentials for #phishing attacks ffs!

                              • Can't get #phished if noone demands, stores, process or even demands such details in the first place!

                              Also which #Government is that incompetent to not be able to setup their own comms?

                              1 Reply Last reply
                              0
                              • signalapp@mastodon.worldS signalapp@mastodon.world

                                These attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent “Signal Support Bot”) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.

                                kkarhan@infosec.spaceK This user is from outside of this forum
                                kkarhan@infosec.spaceK This user is from outside of this forum
                                kkarhan@infosec.space
                                wrote sidst redigeret af
                                #30

                                @signalapp yes, and you have control over all the #Signal usernames, so it's your failing to prevent thode that happen inside your platform!

                                • I know that like any decent system you can block keywords and strings from usernames, display names and so forth.
                                  • If not tuey ou truly are criminally incompetent!
                                divverent@misskey.deD 1 Reply Last reply
                                0
                                • signalapp@mastodon.worldS signalapp@mastodon.world

                                  To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

                                  We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.space
                                  wrote sidst redigeret af
                                  #31

                                  @signalapp THERE IS NO LEGITIMATE REASON FOR #Signal TO DEMAND A #PhoneNumber (= #PII by circumstances if not mandatory doxxing to the governments aka. "#KYC")…

                                  • so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even cock.li of all places…
                                  gettie@fedi.catto.gardenG 1 Reply Last reply
                                  0
                                  • excelanalytics@mastodon.worldE excelanalytics@mastodon.world

                                    @signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.

                                    kkarhan@infosec.spaceK This user is from outside of this forum
                                    kkarhan@infosec.spaceK This user is from outside of this forum
                                    kkarhan@infosec.space
                                    wrote sidst redigeret af
                                    #32

                                    @ExcelAnalytics @signalapp not only that, the entire concept of demaning a #PhoneNumber to use #Signal is inherently and irredeemably wrong to begin with!

                                    lackthereof@beige.partyL 1 Reply Last reply
                                    0
                                    • loke@functional.cafeL loke@functional.cafe

                                      @signalapp as careful as this message is, I think it could be improved. If someone goes to a web page and get phished by being asked to type it into the page, the message will not dter them because it's not someone "asking for the code".

                                      I think the message should say something about where it's intended to be used.

                                      kkarhan@infosec.spaceK This user is from outside of this forum
                                      kkarhan@infosec.spaceK This user is from outside of this forum
                                      kkarhan@infosec.space
                                      wrote sidst redigeret af
                                      #33

                                      @loke @signalapp or even better: DON'T USE INSECURE MEANS THAT ONLY EXIST TO D0X USERS FFS!

                                      1 Reply Last reply
                                      0
                                      • benroyce@mastodon.socialB benroyce@mastodon.social

                                        @FQQD @signalapp

                                        😂

                                        "in a stunning development today, a random mastodon user showed they were able to take over Signal's Signal account. details of the hack remain unclear"

                                        kkarhan@infosec.spaceK This user is from outside of this forum
                                        kkarhan@infosec.spaceK This user is from outside of this forum
                                        kkarhan@infosec.space
                                        wrote sidst redigeret af
                                        #34

                                        @benroyce @FQQD I know the details:

                                        @signalapp are criminally incompetent like #EncroChat at best if not a #HoneyPot like #ANØM aka. #OperationIronside aka. #OperationTrøjanShield...

                                        #Signal #Govware #incompetence #PII #PhoneNumbers #ToldYaSo

                                        1 Reply Last reply
                                        0
                                        • zrb@social.hildebrind.spaceZ zrb@social.hildebrind.space

                                          @FQQD @signalapp quick GET 'EM

                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.space
                                          wrote sidst redigeret af
                                          #35

                                          @zrb @FQQD @signalapp lool
                                          https://infosec.space/@kkarhan/116200603563502633

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper