Tech Made Simple

Hot Topics: All Roku Players Compared | Best iPad Keyboard Cases | How to Get Emergency Satellite Service for Your Phone

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

FBI warns Russian spies targeted Signal app used by Hegseth and DOGE

by Josh Kirschner on March 22, 2026

A member of an FCyber Task Force joins her law enforcement colleagues in preparing for a Joint Criminal Opioid and Darknet Enforcement (JCODE) team operation in 2021

The Federal Bureau of Investigation (FBI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) just warned of a Russian Intelligence Services (RIS) phishing campaign targeting “high intelligence value” individuals. The campaign targeted commercial messaging apps, with Signal accounts specifically identified as a primary target.

Signal has reportedly been used by both the U.S. Department of Defense, including Secretary Hegseth, as well as the Department of Government Efficiency (DOGE). Importantly, the FBI says the attackers did not break Signal’s encryption or hack the app itself, but instead used phishing to gain access to individual accounts.

According to the joint FBI/CISA report, the attacks successfully compromised “thousands” of individual Signal accounts linked to former U.S. government officials, military personnel, political figures, and journalists. This is especially concerning as a recent Department of Defense Inspector General’s report found that, in at least one instance, Hegseth’s communication of nonpublic information over Signal during last year’s bombing of Houthi forces in Yemen “created a risk to operational security that could have resulted in failed U.S. mission objectives and potential harm to U.S. pilots.”

How the phishing attack was carried out

The attack was implemented using standard phishing techniques. In this case, the FBI says the RIS sent messages masquerading as automated Signal support accounts. The messages were tailored to encourage their targets into taking an action, such as clicking a link or providing two-factor authentication codes and account PINs. In doing so, they provided the hackers direct access to their Signal account.

Samples of messages used were provided by the FBI.

A collection of phishing messages used in these schemes. They are: Dear user, this is Signal Security support ChatBot. We have noticed suspicious activity on your device, which could have led to data leak. We have also detected attempts to gain access to your private data on Signal. To prevent this, you have to pass verification procedure, entering the verification code to Signal Security Support Chatbot. Don't tell anyone the code. Not even Signal employees., Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via SMS to your registered phone number. If this was NOT you: To secure your account and block this unauthorized access please reply to this message with the verification code you just received. If this WAS you: You can safely ignore this message. The login attempt will be automatically approved shortly. Thank you for helping us keep your account secure., Dear user, We noticed suspicious activity on your device, which have led to data leak. We have also detected attempts to gain access to your private data in Signal. To prevent this, we ask you to pass verification procedure, which will take less than a minute. Please let us know as soon as you are ready. Best regards, Signal support, Signal Security Team Recently, attempts to hack users of our messenger with the connection of third-party devices to the account have become more frequent. In this regard, Signal updates Terms of Service & privacy policy and introduces Mandatory Two-factor Verification for users. Stay safe and thank you for using the most secure messenger with end-to-end encryption., Dear User, this is Signal Security support Chatbot. Another Samsung Galaxy S 10 device is connected to your account. Location: Drohobych, Lvivska oblast, Ukraine - IP: 178.212.97.211 If it were not you, send: /Cancel

In some cases, attackers also exploited Signal’s linked device feature, sending malicious links or QR codes that allowed them to connect their own device to a victim’s account without taking it over completely.

Once an account was compromised, Russian spies were able to “view the victims' messages and contact lists, send messages, and conduct additional phishing against other Signal accounts.” The FBI warns that attackers may adjust their approach in the future to target additional messaging platforms or to directly install malware on users’ devices.

Preventing a phishing attack

Phishing remains one of the most common ways for hackers to gain illicit access to your accounts. These attacks may come through email, text, social media messages, or even phone calls. But in all cases, the process is the same – bad actors impersonate someone or something you trust to trick you into handing over sensitive information.

The FBI recommends vigilance as your primary defense. Treat unknown or unexpected messages with suspicion – if something feels off, pause before clicking any links or responding. And never share your PIN or 2FA codes for an action you did not initiate. Legitimate support services will not ask you to provide verification codes through messages within an app.

While there are multiple types of 2FA available, for accounts that require the highest level of protection using a physical security key or a passkey offers significant benefits over SMS codes. These methods only allow access to an account if you are in physical possession of the connected device, so there is no code or password for hackers to intercept.

Read more: How this security expert got phished – and why 2FA didn’t save him

[Image credit: FBI, CISA]


Topics

News, Computers and Software, Computer Safety & Support, Blog


Discussion loading

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.