Hackers Steal Codes From Top Officials

Person in hoodie using laptop, surrounded by digital code.

Russian hackers bypassed unbreakable encryption in Signal and WhatsApp by tricking officials into handing over their own keys—what if your next message is already compromised?

Story Snapshot

  • Dutch intelligence exposes large-scale Russian phishing campaign targeting government, military, and journalists’ accounts worldwide.
  • Attackers impersonate support services to steal verification codes and PINs, exploiting human error over app flaws.
  • Confirmed victims include Dutch government employees; campaign remains active globally.
  • Experts warn consumer apps fail for classified info, urging shift to dedicated systems.
  • No technical vulnerabilities in apps—security hinges on user vigilance.

Russian Hackers Launch Global Phishing Assault

Dutch agencies AIVD and MIVD disclosed on March 9, 2026, a Russian state-linked cyber campaign targeting Signal and WhatsApp accounts of high-value targets. Attackers focus on government officials, military personnel, civil servants, and journalists across nations. They employ social engineering, not software exploits, to gain access. Victims already include Dutch government employees, confirming real-world breaches. This operation signals Russia’s tactical shift to account takeovers for espionage.

Phishing Tactics Exploit Legitimate App Features

Hackers impersonate Signal’s support chatbot to request six-digit verification codes from users. On WhatsApp, they abuse linked device functions by tricking targets into approving unauthorized access. Attackers send phishing links mimicking official support, urging PIN disclosure. These methods leverage built-in security protocols designed for user convenience. Dutch intelligence detailed these vectors in their advisory, emphasizing no zero-day exploits occurred. Human psychology proves the weak link here.

Dutch Intelligence Issues Urgent Warning

AIVD Director-General Simone Smit clarified individual accounts face targeting, not platform-wide compromise. MIVD Vice-Admiral Peter Reesink advised against using these apps for classified or sensitive data despite encryption. Meta urged users never to share verification codes and consult help centers. Signal offered no immediate comment. Agencies now aid victims in reclaiming accounts. This public alert aims to protect NATO allies from similar threats.

Historical Context Reveals Evolving Threats

Russian cyber operations historically intercept Western communications but now prioritize direct account compromise. Signal’s independence draws government favor for secure chats, heightening its appeal. Pentagon’s 2025 Signal warning foreshadowed this escalation. Sophisticated social engineering marks increased Russian capabilities. The campaign fits broader espionage against NATO, with Dutch disclosure coordinating allied defenses.

Government protocols may overhaul, ditching consumer apps for bespoke systems. Common sense aligns with MIVD’s view: everyday tools suit casual use, not national security. Investments in anti-phishing training will rise. Trust in encrypted apps erodes, spurring demand for hardened alternatives. Russian gains could sway geopolitics through stolen insights.

Impacts Reshape Security Landscape

Short-term risks expose ongoing operations to interception. Long-term, policies ban these apps for secrets, favoring infrastructure like secure government networks. Journalists safeguard sources amid threats. Political fallout hits diplomacy and planning. Cybersecurity stresses human defenses equal technical ones. Users worldwide adopt stricter habits, boosting sector-wide vigilance.

Sources:

Dutch spies say Russian cybercrims phish their way into Signal and WhatsApp accounts

Russian Hackers Targeting Messaging Apps, Dutch Spies Say

Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn

Russia targets Signal and WhatsApp accounts in cyber campaign

Russia-backed hackers target Signal and WhatsApp accounts of officials, journalists