German Federal Prosecutors Investigate Signal Phishing Campaign Targeting Politicians and Officials
Introduction
German federal prosecutors have initiated an investigation into a series of phishing attacks directed at users of the Signal messaging application, with high-ranking politicians, civil servants, diplomats, and journalists among the targets. The inquiry, announced on April 24, is based on preliminary suspicion of espionage.
Main Body
The investigation was launched by the German Federal Prosecutor's Office following reports of a coordinated phishing campaign. According to statements from the prosecution service, the probe began in mid-April. The office declined to provide specific details regarding suspects or the full extent of the targets. However, media reports and statements from lawmakers indicate that the attacks have affected members of several political parties, including the Christian Democratic Union (CDU), the Social Democratic Party (SPD), and the Left Party (Die Linke). Notably, the Signal account of Bundestag President Julia Klöckner, a CDU member, was successfully compromised. An attempt to access the account of Chancellor Friedrich Merz was reportedly unsuccessful. The method of attack involves phishing messages that appear to originate from Signal's support team, requesting sensitive account information. The attackers do not employ malware or exploit technical vulnerabilities; instead, they leverage the application's legitimate security features combined with social engineering to gain unauthorized access to individual and group chats, as well as contact lists. Once access is obtained, the perpetrators can view shared files and photos and impersonate the compromised user. The German domestic intelligence service (BfV) and the Federal Office for Information Security (BSI) have issued warnings about this campaign since early 2024, noting that it remains active and is gaining momentum. Attribution of the attacks has been a subject of discussion. Dutch intelligence services publicly identified Russian state actors as responsible in March. German authorities have not officially named a perpetrator, but suspicion has focused on Russia, which denies involvement. CDU lawmaker Marc Heinrichmann, who chairs the parliamentary committee overseeing intelligence services, described the phishing attempt as a "wake-up call" and emphasized the need for vigilance. Another CDU parliamentarian, Konstantin von Notz, expressed concern that the scale of the attacks raises questions about the integrity of parliamentary communications. The German government has stated that communications among the chancellor, ministers, and government officials are conducted via secure channels. The campaign occurs against a backdrop of increased cyber and espionage activities targeting Germany, which has been a major military aid provider to Ukraine since Russia's full-scale invasion in 2022. German security services have previously accused hackers linked to Russian military intelligence of infiltrating internet routers and targeting air traffic control systems, as well as spreading disinformation ahead of the 2025 federal elections. The shift of many users from WhatsApp to Signal, driven by privacy concerns, may have expanded the potential attack surface.
Conclusion
The investigation into the Signal phishing campaign is ongoing, with German authorities working to determine the full scope of the compromise and identify those responsible. The incident underscores persistent cybersecurity challenges facing German political and governmental institutions amid heightened geopolitical tensions.