CERT Aviation France a republié ceci
Google Threat Intelligence Group (GTIG) is tracking how APT44 (AKA Sandworm), along with other Russian state-aligned hackers, are spying on Signal accounts used by Ukrainian military and government personnel. Our latest research explores these operations, with a particular focus on how threat actors are exploiting Signal's built-in "linked device" feature, often through the use of malicious QR codes. Tactics include: - Modified Signal group invites - Custom-developed Signal phishing kit - Android malware and other efforts to steal messages from Signal Successful device-linking compromises are tricky to detect, and can go unnoticed for long periods of time. GTIG partnered with Signal on this research, and the latest Signal releases contain measures to help protect against these threats. We also provide guidance to help organizations stay protected, and Indicators of Compromise for defenders to hunt and identify this activity. Read more: https://bit.ly/4k5DbIz #Cybersecurity #ThreatIntelligence #APT #Phishing