Close Menu
AI News TodayAI News Today

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Khosla Ventures is betting $10M on Ian Crosby, whose last startup, Bench, imploded

    Spotify to adopt Apple’s new video podcast tech, offering creators easier cross-platform distribution

    The Counterintuitive Networking Decisions Behind OpenAI’s 131,000-GPU Training Fabric

    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook X (Twitter) Instagram Pinterest Vimeo
    AI News TodayAI News Today
    • Home
    • Shop
    • AI News
    • AI Reviews
    • AI Tools
    • AI Tutorials
    • Chatbots
    • Free AI Tools
    AI News TodayAI News Today
    Home»Chatbots»A spyware investigator exposed Russian government hackers trying to hijack Signal accounts
    Chatbots

    A spyware investigator exposed Russian government hackers trying to hijack Signal accounts

    By No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Portrait of hacker and IT security researcher Donncha O’Cearbheill at Amnesty International's offices in Berlin-Mitte.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Earlier this year, Donncha Ó Cearbhaill, a security researcher who investigates spyware attacks, found himself in an unusual position. For once, he became the target of hackers.

    “Dear User, this is Signal Security Support ChatBot. We have noticed suspicious activity on your device, which could have led to data leak,” read a message he received on his Signal account. 

    “We have also detected attempts to gain access to your private data in Signal,” the message claimed.

    “To prevent this, you have to pass verification procedure, entering the verification code to Signal Security Support Chatbot. DON’T TELL ANYONE THE CODE, NOT EVEN SIGNAL EMPLOYEES.”

    Obviously, Ó Cearbhaill, who heads Amnesty International’s Security Lab, immediately recognized that this was an “unwise” attempt at hacking his Signal account. Instead, he thought it’d be a good opportunity to jump into an unexpected investigation. 

    The researcher told TechCrunch that until then, he had “never knowingly” been targeted with a one-click cyberattack or a phishing attempt like this before.

    “Having the attack land in my inbox, and the chance to turn the tables on the attackers and understand more about the campaign was too good to pass up,” he said.

    As it turned out, the attempted attack on Ó Cearbhaill was likely part of a wider hacking campaign targeting a large group of Signal users. The hackers’ strategies were to impersonate Signal, warn of bogus security threats, and try to trick targets into giving the hackers access to their account by linking it to a device controlled by the hackers.

    Those techniques were exactly the same as those seen in a wider campaign that the U.S. cybersecurity agency CISA, the United Kingdom’s cybersecurity agency, and Dutch intelligence, have all warned of the attacks, and blamed on Russian government spies. Signal, too, has warned of phishing attacks targeting its users. German news magazine Der Spiegel found that the Russian hackers were able to compromise several people inside the country, including high-profile politicians. 

    Ó Cearbhaill said in a series of online posts that he was able to figure out that he was one of more than 13,500 targets. He declined to reveal exactly how he investigated the hacking attempt and campaign to avoid revealing his hand to the hackers, but shared a few details about what he learned.

    A screenshot of the phishing attack that targeted donncha Ó Cearbhaill, a security researcher at Amnesty International. (Image: DONNCHA Ó Cearbhail)Image Credits:Donncha Ó Cearbhaill

    First, he realized that other targets included journalists he had worked with, as well as a colleague. At that point, Ó Cearbhaill said he already suspected this was an opportunistic attack where hackers compromised targets and identified new potential victims, thanks to those successful attacks. 

    Ó Cearbhaill called it a “snowball hypothesis,” and said he is convinced he became a target because he was likely in a group chat with someone who got hacked, which gave the hackers a chance to find the contact information of new targets. 

    The researcher said he was able to identify the system the hackers were using, which is called “ApocalypseZ,” which automates the attack, allowing the hackers to target many people at the same time in bulk with limited human oversight. 

    He also found that the codebase and operator interface is in Russian, and the hackers were translating victim chats into Russian, which lines up with the hypothesis that this was the same Russian government hacking group behind similar campaigns. 

    Ó Cearbhaill said that he’s still monitoring the campaign, and has seen the attacks continue, meaning the total number of targets is certainly much higher than the number he saw earlier this year. 

    He said he doubts the hackers will go after him again, and probably regret going after him in the first place. He said: “I welcome future messages, especially if they have zero-days they would like to share,” referring to security flaws that are not yet known to the vendor, which are often used in attacks that he investigates.

    Ó Cearbhaill said that if Signal users are worried about getting targeted with this type of attack, they should turn on Registration Lock, a feature that lets users set a PIN for their account that prevents others from registering their phone number on a different device.

    When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

    accounts exposed government hackers hijack investigator Russian Signal spyware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleEstablishing AI and data sovereignty in the age of autonomous systems
    Next Article Unlocking asynchronicity in continuous batching
    • Website

    Related Posts

    Chatbots

    The Beats Solo 4 have returned to their best price of the year

    Chatbots

    I’m obsessed with Forza Horizon 6, and I’ve barely even raced

    Chatbots

    Desperate Trump taps “Tim Apple,” Jensen Huang, Elon Musk to attend Xi summit

    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Khosla Ventures is betting $10M on Ian Crosby, whose last startup, Bench, imploded

    0 Views

    Spotify to adopt Apple’s new video podcast tech, offering creators easier cross-platform distribution

    0 Views

    The Counterintuitive Networking Decisions Behind OpenAI’s 131,000-GPU Training Fabric

    0 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    AI Tutorials

    Quantization from the ground up

    AI Tools

    David Sacks is done as AI czar — here’s what he’s doing instead

    AI Reviews

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Khosla Ventures is betting $10M on Ian Crosby, whose last startup, Bench, imploded

    0 Views

    Spotify to adopt Apple’s new video podcast tech, offering creators easier cross-platform distribution

    0 Views

    The Counterintuitive Networking Decisions Behind OpenAI’s 131,000-GPU Training Fabric

    0 Views
    Our Picks

    Quantization from the ground up

    David Sacks is done as AI czar — here’s what he’s doing instead

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Terms & Conditions
    • Privacy Policy
    • Disclaimer

    © 2026 ainewstoday.co. All rights reserved. Designed by DD.

    Type above and press Enter to search. Press Esc to cancel.