ForumsGeneralRussian Ops Pivot to CMAs: Signal & WhatsApp Under Fire

Russian Ops Pivot to CMAs: Signal & WhatsApp Under Fire

SysAdmin_Dave 3/22/2026 USER

Just caught the new joint advisory from CISA and the FBI regarding Russian intelligence actors shifting their focus to Commercial Messaging Applications (CMAs) like Signal and WhatsApp. It seems the threat model has evolved; they are actively conducting mass phishing campaigns to hijack sessions of high-value targets rather than just going for standard email credentials.

The primary vector here is likely QR code phishing (QRLjacking) targeting the "Link Device" feature. Unlike traditional phishing, the victim scans a code presented by the attacker, instantly syncing the active session to the attacker's device. Since the user is already authenticated, this bypasses MFA entirely.

If you are monitoring your perimeter, keep an eye out for suspicious User-Agent strings often used in automated toolkits. Here is a KQL query to help hunt for anomalies in your proxy logs where the 'Signal' or 'WhatsApp' keyword appears alongside rare countries:

DeviceProxyEvents
| where RequestUrl contains "signal.org" or RequestUrl contains "whatsapp.net"
| project Timestamp, DeviceName, RequestUrl, DestinationIP, Country
| where Country !in ("UnitedStates", "UnitedKingdom", "Canada") // Adjust based on your org
| summarize Count = count() by DeviceName, Country, bin(Timestamp, 1h)
| where Count > 5
| sort by Count desc

How is everyone handling the security of these comms apps? Are you enforcing strict MDM policies, or have you gone as far as blocking desktop clients entirely to prevent the QR code attack surface?

ZE
ZeroDayHunter3/22/2026

The QR code vector is nasty because it bypasses the need for credentials entirely. In our red team exercises, we've had massive success using modified versions of open-source phishing kits to present 'Signal Desktop' login pages that actually just display a looped video of a QR code. The user scans it, and we own the session. Blocking the desktop clients is the only 100% mitigation I've found that doesn't break usability, provided you can enforce it via EDR policies.

CI
CISO_Michelle3/22/2026

From a SOC perspective, detection is incredibly difficult here. Since the traffic is end-to-end encrypted (E2EE), we can't inspect the payload. We are currently relying on heuristic detection of the devices themselves—flagging when a corporate mobile device tries to pair with a new desktop endpoint via QR. We push a notification to the user and the security team immediately if the 'Linked Devices' list changes.

NE
NetGuard_Mike3/22/2026

We tackled this by rolling out mobile device management (MDM) profiles that explicitly disable the 'Show QR Code' feature in the app settings on managed devices. It's a bit of a friction point for users who legitimately want to use Signal Desktop at home, but for our high-risk users (HR, Execs, M&A), the trade-off is worth it. Combine that with strict conditional access policies, and you reduce the attack surface significantly.

SE
SecurityTrainer_Rosa3/24/2026

For BYOD scenarios where MDM isn't an option, we drill users on the "Safety Number Change" notification. This is the critical alert that fires when a new session links; we treat any unexpected change as a potential breach. To supplement this, we identify devices running these desktop clients for risk scoring using Defender ATP:

DeviceProcessEvents
| where ProcessName has_any ("WhatsApp.exe", "Signal.exe")
| summarize count() by DeviceName, bin(Timestamp, 1d)
PH
PhysSec_Marcus3/24/2026

Excellent points on the technical vectors. From a physical security perspective, I want to highlight that QR-based attacks are significantly easier to execute without visual privacy controls. We’ve seen a rise in "shoulder surfing" incidents where attackers capture QR codes from unattended screens or over the shoulder in public spaces.

As a countermeasure, we’ve mandated privacy filters for all high-value employee devices and strictly enforced our clean desk policy to ensure linking screens aren't left open. It’s a low-tech fix, but it effectively neutralizes the line-of-sight requirement for many of these physical access exploits.

LO
LogAnalyst_Pete3/25/2026

To expand on detection challenges: while E2EE blinds us to the messaging payload, we can still catch the initial access vector. The web traffic hosting the phishing QR code isn't usually encrypted. We've started hunting for specific User-Agent anomalies or keywords in proxy logs associated with known QRLjacking frameworks. You might try a simple query on your web proxy to spot the hosting infrastructure:

WebProxy | where Url contains "qr" and ResponseCode == 200 | distinct SrcIp, Url

This catches the setup before the session is even linked.

VP
VPN_Expert_Nico3/25/2026

While E2EE limits payload visibility, we can monitor metadata and handshake anomalies. In my experience, legitimate linking often has specific TLS fingerprints (JA3 hashes). I recommend hunting for corporate desktop connections to signal.org or whatsapp.net that deviate from standard app signatures or originate from unexpected processes.

Here is a basic KQL query to start hunting for these anomalies:

DeviceNetworkEvents
| where RemoteUrl in ("whatsapp.net", "signal.org")
| where ActionType == "ConnectionSuccess"
| summarize Count = count() by DeviceName, InitiatingProcessFileName, RemoteUrl
| where Count > 10

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created3/22/2026
Last Active3/25/2026
Replies7
Views94