A space to share my interests and concerns. All opinions are my own, and my research is provided in good faith. Please refer to the disclaimer or use the contact form for any questions or concerns.

The FBI and CISA just dropped PSA I-032026-PSA warning of a global phishing campaign by Russian Intelligence Services (RIS)-linked actors targeting commercial messaging apps (primarily Signal, but tactics apply to Telegram/WhatsApp too).

Core details from the official advisory:

• High-value targets: Current/former U.S. officials, military, politicians, journalists.

• Method: Fake in-app “support” messages (e.g., “Signal Security ChatBot”) claiming suspicious activity → trick users into clicking malicious links/QR codes (links attacker’s device) or sharing PINs/2FA codes (full takeover).

• Result: Attackers read messages, view contacts, impersonate victims, and phish further — bypassing encryption by owning the account.

• Scope: Thousands of accounts hit worldwide.

Read the full PSA: https://www.ic3.gov/PSA/2026/PSA260320

Additional context beyond this specific PSA (from concurrent March 2026 reports by Google Threat Intelligence, Lookout, iVerify, and others):

• A separate iOS zero-click exploit kit called DarkSword (targeting iOS 18.4–18.7) is in active use by suspected Russian group UNC6353 (among others). It enables drive-by infections via compromised “watering hole” sites — no click/download needed — deploying spyware that steals messages, location, photos, crypto wallets, and more.

• While the PSA sticks to account-level phishing, broader Russian-linked ops (including DarkSword watering holes) sometimes exploit human “vices” — curiosity around suggestive content, leaked celebrity videos, scandals, or private/political documents — to lure victims to malicious sites or prompts. These aren’t detailed in the FBI/CISA advisory but align with historical state-sponsored tactics to socially engineer high-value users when direct app compromise fails.

Quick protection steps:

• Never share codes/PINs or click unsolicited links in messaging apps.

• Verify suspicious messages out-of-band (call/text the real contact).

• Update iOS now if on 18.4–18.7.

• Enable disappearing messages; regularly check linked devices/groups.

• Report to IC3 or your security team.

Phishing still wins because it targets people, not code.

#CyberSecurity #FBI #CISA #SignalApp #Phishing #DarkSword #ThreatIntel #RussiaCyber

Disclaimer: Written with AI. The information above is for educational purposes based on public security reports. I do not represent any government agency, corporation, or employer. These views are shared on my personal time and device premises and do not constitute professional or legal security advice.