German police investigate fake messages to politicians
German police investigate fake messages to politicians
Introduction
German police started an investigation. They look at fake messages on the Signal app. The messages try to get secret information. The targets are politicians, government workers, diplomats, and journalists. The police think it is spying.
Main Body
The investigation started in mid-April. The police did not give many details. But media reports say many politicians from different parties were attacked. Attackers hacked the Signal account of Julia Klöckner. She is the head of the German parliament. They tried to hack the Chancellor's account, but it did not work. The attack uses fake messages. The messages look like they come from Signal's support team. They ask for account information. The attackers do not use computer viruses. They use the app's own security features. They trick people to give them passwords. Once they get in, they can see chats, files, and photos. They can also pretend to be the user. German security agencies warned about this since early 2024. Who did it? Dutch intelligence said Russian state actors. German authorities did not name anyone, but they think Russia. Russia says it did not do it. A German lawmaker called the attack a 'wake-up call'. Another lawmaker worried about the safety of parliament communications. The government says it uses secure channels for important talks. This happens because Germany gives a lot of military help to Ukraine. German security services found Russian hackers before. They attacked internet routers and air traffic control. They also spread false information before the 2025 elections. Many people now use Signal instead of WhatsApp for privacy. This may give attackers more chances to attack.
Conclusion
The investigation continues. German authorities want to know how many people were affected and who did it. The attacks show that German political groups need to be careful about online safety.
Vocabulary Learning
Sentence Learning
German Federal Prosecutors Investigate Signal Phishing Campaign Targeting Politicians and Officials
Introduction
German federal prosecutors have started an investigation into a series of phishing attacks aimed at users of the Signal messaging app. The targets include high-ranking politicians, civil servants, diplomats, and journalists. The inquiry, announced on April 24, is based on initial suspicion of espionage.
Main Body
The investigation was launched by the German Federal Prosecutor's Office after reports of a coordinated phishing campaign. According to the prosecution service, the probe began in mid-April. The office did not give specific details about suspects or the full number of targets. However, media reports and statements from lawmakers show that the attacks have affected members of several political parties, including the Christian Democratic Union (CDU), the Social Democratic Party (SPD), and the Left Party (Die Linke). Notably, the Signal account of Bundestag President Julia Klöckner, a CDU member, was successfully hacked. An attempt to access the account of Chancellor Friedrich Merz was reportedly unsuccessful. The method of attack involves phishing messages that look like they come from Signal's support team, asking for sensitive account information. The attackers do not use malware or exploit technical weaknesses. Instead, they use the app's legitimate security features combined with social engineering to gain unauthorized access to individual and group chats, as well as contact lists. Once they have access, they can view shared files and photos and pretend to be the compromised user. The German domestic intelligence service (BfV) and the Federal Office for Information Security (BSI) have issued warnings about this campaign since early 2024. They note that it is still active and growing. Who is responsible for the attacks has been a topic of discussion. In March, Dutch intelligence services publicly identified Russian state actors as responsible. German authorities have not officially named a perpetrator, but suspicion has focused on Russia, which denies involvement. CDU lawmaker Marc Heinrichmann, who chairs the parliamentary committee overseeing intelligence services, described the phishing attempt as a 'wake-up call' and emphasized the need for alertness. Another CDU parliamentarian, Konstantin von Notz, expressed concern that the scale of the attacks raises questions about the security of parliamentary communications. The German government has stated that communications among the chancellor, ministers, and government officials are conducted via secure channels. This campaign takes place against a background of increased cyber and espionage activities targeting Germany, which has been a major military aid provider to Ukraine since Russia's full-scale invasion in 2022. German security services have previously accused hackers linked to Russian military intelligence of infiltrating internet routers and targeting air traffic control systems, as well as spreading disinformation ahead of the 2025 federal elections. The shift of many users from WhatsApp to Signal, driven by privacy concerns, may have expanded the potential attack surface.
Conclusion
The investigation into the Signal phishing campaign is ongoing. German authorities are working to determine the full extent of the compromise and identify those responsible. The incident highlights the persistent cybersecurity challenges facing German political and governmental institutions amid increased political tensions.
Vocabulary Learning
Sentence Learning
German Federal Prosecutors Investigate Signal Phishing Campaign Targeting Politicians and Officials
Introduction
German federal prosecutors have initiated an investigation into a series of phishing attacks directed at users of the Signal messaging application, with high-ranking politicians, civil servants, diplomats, and journalists among the targets. The inquiry, announced on April 24, is based on preliminary suspicion of espionage.
Main Body
The investigation was launched by the German Federal Prosecutor's Office following reports of a coordinated phishing campaign. According to statements from the prosecution service, the probe began in mid-April. The office declined to provide specific details regarding suspects or the full extent of the targets. However, media reports and statements from lawmakers indicate that the attacks have affected members of several political parties, including the Christian Democratic Union (CDU), the Social Democratic Party (SPD), and the Left Party (Die Linke). Notably, the Signal account of Bundestag President Julia Klöckner, a CDU member, was successfully compromised. An attempt to access the account of Chancellor Friedrich Merz was reportedly unsuccessful. The method of attack involves phishing messages that appear to originate from Signal's support team, requesting sensitive account information. The attackers do not employ malware or exploit technical vulnerabilities; instead, they leverage the application's legitimate security features combined with social engineering to gain unauthorized access to individual and group chats, as well as contact lists. Once access is obtained, the perpetrators can view shared files and photos and impersonate the compromised user. The German domestic intelligence service (BfV) and the Federal Office for Information Security (BSI) have issued warnings about this campaign since early 2024, noting that it remains active and is gaining momentum. Attribution of the attacks has been a subject of discussion. Dutch intelligence services publicly identified Russian state actors as responsible in March. German authorities have not officially named a perpetrator, but suspicion has focused on Russia, which denies involvement. CDU lawmaker Marc Heinrichmann, who chairs the parliamentary committee overseeing intelligence services, described the phishing attempt as a "wake-up call" and emphasized the need for vigilance. Another CDU parliamentarian, Konstantin von Notz, expressed concern that the scale of the attacks raises questions about the integrity of parliamentary communications. The German government has stated that communications among the chancellor, ministers, and government officials are conducted via secure channels. The campaign occurs against a backdrop of increased cyber and espionage activities targeting Germany, which has been a major military aid provider to Ukraine since Russia's full-scale invasion in 2022. German security services have previously accused hackers linked to Russian military intelligence of infiltrating internet routers and targeting air traffic control systems, as well as spreading disinformation ahead of the 2025 federal elections. The shift of many users from WhatsApp to Signal, driven by privacy concerns, may have expanded the potential attack surface.
Conclusion
The investigation into the Signal phishing campaign is ongoing, with German authorities working to determine the full scope of the compromise and identify those responsible. The incident underscores persistent cybersecurity challenges facing German political and governmental institutions amid heightened geopolitical tensions.