Google's Threat Analysis Group (TAG) observed multiple Russia-aligned threat actors, including APT29 (Cozy Bear) and Sandworm, actively targeting Signal users. These campaigns primarily focused on stealing authentication material from Signal servers, likely to bypass Signal's robust encryption and gain access to user communications. Although Signal's server-side infrastructure was targeted, the attackers needed physical access to the device to complete the compromise, significantly limiting the attack's effectiveness. While Signal's encryption remains unbroken, the targeting underscores the lengths to which nation-state actors will go to compromise secure communications.
A hacker tricked approximately 18,000 aspiring cybercriminals ("script kiddies") by distributing a fake malware builder. Instead of creating malware, the tool actually infected their own machines with a clipper, which silently replaces cryptocurrency wallet addresses copied to the clipboard with the attacker's own, diverting any cryptocurrency transactions to the hacker. This effectively turned the tables on the would-be hackers, highlighting the risks of using untrusted tools from underground forums.
HN commenters largely applaud the vigilante hacker's actions, viewing it as a form of community service by removing malicious actors and their potential harm. Some express skepticism about the 18,000 figure, suggesting it's inflated or that many downloads may not represent active users. A few raise ethical concerns, questioning the legality and potential collateral damage of such actions, even against malicious individuals. The discussion also delves into the technical aspects of the fake builder, including its payload and distribution method, with some speculating on the hacker's motivations beyond simple disruption.
Summary of Comments ( 4 )
https://news.ycombinator.com/item?id=43102284
HN commenters express skepticism about the Google blog post, questioning its timing and motivations. Some suggest it's a PR move by Google, designed to distract from their own security issues or promote their own messaging platforms. Others point out the lack of technical details in the post, making it difficult to assess the credibility of the claims. A few commenters discuss the inherent difficulties of securing any messaging platform against determined state-sponsored actors and the importance of robust security practices regardless of the provider. The possibility of phishing campaigns, rather than Signal vulnerabilities, being the attack vector is also raised. Finally, some commenters highlight the broader context of the ongoing conflict and the increased targeting of communication platforms.
The Hacker News post titled "Multiple Russia-aligned threat actors actively targeting Signal Messenger" generated a moderate number of comments, mostly focusing on the plausibility and implications of the Google Cloud Threat Intelligence Team's report. Several commenters expressed skepticism about the report's claims, questioning the motivation and evidence presented.
One prominent line of discussion revolved around the lack of technical details in the report. Several users pointed out the absence of specific information about the attacks, making it difficult to assess the credibility and severity of the alleged targeting. They argued that without concrete evidence, the report reads more like a general warning or even fear-mongering. This lack of technical specifics also led some to speculate about the true nature of the attacks, suggesting possibilities like phishing campaigns or attempts to compromise user devices rather than exploiting vulnerabilities in Signal itself.
Another recurring theme was the perceived political context of the announcement. Some commenters questioned the timing and framing of the report, suggesting it might be influenced by the ongoing geopolitical tensions involving Russia. They speculated that the report could be part of a broader narrative aimed at portraying Russia as a cyber threat.
Some users discussed the potential targets of such attacks. Given Signal's popularity among journalists, activists, and other individuals likely to be of interest to Russian intelligence agencies, several comments highlighted these groups as the most probable targets. This led to discussions about the effectiveness of Signal's security measures and whether these attacks, if real, could have successfully compromised user communications.
A few commenters also brought up the broader implications of the report for the security and privacy of messaging platforms. They discussed the challenges of protecting user data against sophisticated state-sponsored attackers and the importance of continuous improvement in security practices.
Finally, a smaller number of comments focused on the technical aspects of potential attacks against Signal. These discussions included speculation about the methods attackers might employ, such as exploiting vulnerabilities in the Signal protocol or targeting specific device platforms. However, due to the lack of information in the original report, these discussions remained largely speculative.