[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$frf-w0aYvF0SY5QJDkyATjvMyrF0ig20mLfbXsocYBhA":3},{"article":4,"iocs":48},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":27,"category":28,"article_tags":32},"fa6d69ff-7fa2-4393-9652-f34c7fe89018","Signal adds security warnings for social engineering, phishing attacks","signal-adds-security-warnings-for-social-engineering-phishing-attacks-899bdc","Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. [...]","Signal has introduced new in-app security confirmations and warning messages to protect users against phishing and social engineering attacks, particularly targeting high-profile users. The attacks involved Russian state-sponsored actors exploiting Signal's Linked Device feature by tricking victims into scanning QR codes or sharing one-time codes, granting attackers access to accounts, chats, and contacts. New protections include 'Name not verified' labels, 'No groups in common' indicators, confirmation prompts for new message requests, and safety tip reminders.","Signal adds in-app warnings to combat phishing and social engineering via linked device abuse.","Signal adds security warnings for social engineering, phishing attacks By Bill Toulas May 12, 2026 03:40 PM 0 Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. The purpose is to introduce enough friction that users get the time to evaluate the safety of an external request. Recently, there have been attacks targeting high-profile users with bogus ‘Signal Support’ alerts, as highlighted by the FBI, the Dutch government, and the German authorities. All incidents were attributed to Russian state-sponsored hackers, who abused the Linked Device feature to gain access to the target’s account, chats, and contacts lists. The attack works by convincing the victim to scan a QR code or share one-time codes, supposedly as part of a verification process to protect their accounts from suspicious activity. This allows threat actors to link their device to the target account and obtain access to all the data. “To help protect Signal users from phishing and social engineering attacks, we’ve introduced additional confirmations and educational messaging in the app to help people better detect fraudulent profiles, especially message requests from scammers posing as Signal,” the vendor explained. The new protections are summarized as follows: Signal will display a ‘Name not verified’ underneath contacts that establish communication via direct messages, and also a ‘No groups in common’ to highlight the lack of any association with the recipient. When a new request arrives, Signal will prompt the user to confirm the acceptance while reminding them that it will never request their registration code, PIN, or recovery key. Safety tips are now richer, with new entries and additional info. Reminders to never respond to chats pretending to come from Signal Support will be pushed to users. Signal's new phishing and social engineering protectionsSource: Signal Social engineering remains one of the most effective forms of cyberattack, providing a complete bypass of existing security measures. Users should stay on high alert for suspicious messages from unknown contacts, especially requests to scan QR codes or share verification codes. Signal users should also check for rogue linked devices in settings and remove any they don’t recognize. 99% of What Mythos Found Is Still Unpatched. AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop. Claim Your Spot Related Articles: TikTok for Business accounts targeted in new phishing campaignFBI links Signal phishing attacks to Russian intelligence servicesAndroid 17 to expand banking scam call and privacy protectionsWebinar this week: Prevention alone is not enough against modern attacksHackers abuse Google ads for GoDaddy ManageWP login phishing","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fsignal-adds-security-warnings-for-social-engineering-phishing-attacks\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2025\u002F09\u002F08\u002FSignal.jpg","2026-05-12T19:40:31+00:00","2026-05-12T20:00:23.537209+00:00",7,[18,21,24],{"name":19,"type":20},"Signal","product",{"name":22,"type":23},"Signal (Open Whisper Systems)","vendor",{"name":25,"type":26},"Russian state-sponsored hackers","threat_actor","2c8f44d4-b56e-47cf-9677-04f22c9ee78d",{"id":27,"icon":29,"name":30,"slug":31},null,"Identity & Access","identity-access",[33,38,43],{"category":34},{"id":35,"icon":29,"name":36,"slug":37},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":39},{"id":40,"icon":29,"name":41,"slug":42},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":44},{"id":45,"icon":29,"name":46,"slug":47},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[49,53],{"type":50,"value":51,"context":52},"mitre_attack","T1566.002 (Phishing: Spearphishing Link)","QR code phishing attacks to obtain verification codes",{"type":50,"value":54,"context":55},"T1528 (Steal Application Access Token)","Linked Device feature abuse to obtain account access tokens"]