Visualização normal

Antes de ontemStream principal
  • ✇Firewall Daily – The Cyber Express
  • CISA, FBI Warn of Phishing Campaign Targeting Messaging App Users Samiksha Jain
    A new phishing campaign targeting messaging apps has triggered warnings from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), highlighting how even the most secure communication platforms can be undermined by human error rather than technical flaws. In a joint public service announcement, the agencies revealed that cyber actors linked to Russian Intelligence Services are actively targeting users of commercial messaging applications (CM
     

CISA, FBI Warn of Phishing Campaign Targeting Messaging App Users

25 de Março de 2026, 05:19

Phishing Campaign Targeting Messaging Apps Users

A new phishing campaign targeting messaging apps has triggered warnings from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), highlighting how even the most secure communication platforms can be undermined by human error rather than technical flaws. In a joint public service announcement, the agencies revealed that cyber actors linked to Russian Intelligence Services are actively targeting users of commercial messaging applications (CMAs), including high-profile individuals such as government officials, military personnel, political figures, and journalists. The goal is not to break encryption—but to bypass it entirely.

Phishing Campaign Targeting Messaging Apps Bypasses Encryption

The most striking aspect of this phishing campaign targeting messaging apps is that it does not rely on exploiting software vulnerabilities. Instead, attackers are focusing on users themselves. Evidence shows that while encryption remains intact, thousands of individual accounts have already been compromised globally. Once attackers gain access, they can read private messages, access contact lists, send messages as the victim, and even launch further phishing attacks. This reinforces a critical point often overlooked in cybersecurity discussions: encryption is only as strong as the user behind it.

How the Phishing Campaign Works

According to CISA and the FBI, the phishing campaign targeting messaging apps primarily uses social engineering tactics. Attackers impersonate official support accounts within messaging platforms, sending convincing messages that prompt users to take immediate action. These messages may:
  • Ask users to click on malicious links
  • Request verification codes or PINs
  • Encourage account “recovery” actions
[caption id="attachment_110552" align="aligncenter" width="480"]Phishing Campaign Targeting Messaging Apps Image Source: FBI[/caption] If a user complies, attackers can link their own device to the account or take full control. In some cases, attackers may escalate their tactics by deploying malware, making the campaign more persistent and difficult to contain. Notably, reporting suggests that platforms like Signal have been specifically targeted, though similar methods can be applied across other messaging apps. [caption id="attachment_110553" align="aligncenter" width="948"]Phishing Campaign Targeting Messaging Apps Image Source: FBI[/caption]

Why This Phishing Campaign Targeting Messaging Apps Matters

The scale and simplicity of this phishing campaign targeting messaging apps make it particularly dangerous. Unlike complex cyberattacks, phishing requires minimal technical sophistication but delivers high success rates. CISA and the FBI emphasized this reality, stating: “Phishing remains one of the most unsophisticated, yet effective means of cyber compromise, often rendering other protections irrelevant including end-to-end encryption.”

Key Recommendations for Users

To counter the risks posed by the phishing campaign targeting messaging apps, authorities are urging users to adopt basic but effective cybersecurity practices:
  • Pause before responding: If something feels suspicious, do not engage or share sensitive information.
  • Avoid unknown messages: Treat unexpected or unusual requests with caution, even from known contacts.
  • Check links carefully: Do not click on unfamiliar or suspicious links.
  • Monitor group chats: Watch for duplicate or fake accounts in conversations.
  • Use built-in security features: Enable protections like message expiration where appropriate.
  • Report incidents quickly: Notify security teams or report to authorities such as the Internet Crime Complaint Center (IC3).
Users are also reminded that legitimate support services do not request verification codes or send account recovery links via direct messages.

A Persistent Cyber Threat That Relies on Human Behavior

What makes this phishing campaign targeting messaging apps particularly concerning is its reliance on human behavior rather than technical weaknesses. Attackers are betting on urgency, confusion, and trust—factors that technology alone cannot fix. The warning from CISA and the FBI is clear: users must remain vigilant. Strengthening personal cybersecurity habits is now just as important as the security features built into the platforms themselves. As messaging apps continue to play a central role in both personal and professional communication, campaigns like this serve as a reminder that the weakest link in cybersecurity is often not the system—but the user.
  • ✇Security Affairs
  • Poorly crafted phishing campaign leverages bogus security incident report Pierluigi Paganini
    Attackers used a fake PDF incident report hosted on AWS to scare victims into enabling 2FA, though a poorly crafted phishing campaign. Freelance security consultant Xavier Mertens reported a phishing campaign using a fake PDF security incident report hosted on AWS to scare victims into enabling 2FA. The researchers pointed out that the campaign appears poorly crafted. The phishing message contains a link that leads to an AWS-hosted page (hxxps://access-authority-2fa7abff0e[.]s3.us-east-1[
     

Poorly crafted phishing campaign leverages bogus security incident report

17 de Fevereiro de 2026, 09:46

Attackers used a fake PDF incident report hosted on AWS to scare victims into enabling 2FA, though a poorly crafted phishing campaign.

Freelance security consultant Xavier Mertens reported a phishing campaign using a fake PDF security incident report hosted on AWS to scare victims into enabling 2FA. The researchers pointed out that the campaign appears poorly crafted.

The phishing message contains a link that leads to an AWS-hosted page (hxxps://access-authority-2fa7abff0e[.]s3.us-east-1[.]amazonaws[.]com/index.html) and includes a PDF titled “Security_Reports.pdf.”

Mertens states the phishing campaign targets MetaMask users urges them to enable 2FA. The “Security_Reports.pdf” attachment claims unusual login activity to alarm victims. The PDF itself is not malicious and was generated using ReportLab, but it is meant to create fear and push users into following the attacker’s instructions.

Despite the tactic, the campaign is low quality: the sender isn’t spoofed and the PDF isn’t personalized or branded, making the scam easier to spot.

“The goal is simple: To make the victim scary and ready to “increase” his/her security by enabled 2FA.” reads the report published by the researcher. “I had a look at the PDF content. It’s not malicious. Interesting, it has been generated through ReportLab[2], an online service that allows you to create nice PDF documents!”

“Besides the idea to use a fake incident report, this campaign remains at a low quality level because the “From” is not spoofed, the PDF is not “branded” with at least the victim’s email. If you can automate the creation of a PDF file, why not customize it?” he concludes.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, phishing campaign)

❌
❌