Phishing continues to cause harm and victims. Today, the messaging application Signal is the collateral victim of a new large-scale attack, particularly well-established, which targeted Twilio. Data from 2,000 users was stolen. We will keep you updated on this news, which is not reassuring, and on the various techniques to avoid being fooled by phishing.
Email app cheated
Strictly speaking, Signal is not the victim of this phishing scam, Twilio is. It is an unknown company, but essential to allow the messaging application to function properly. And for good reason, Twilio provides Signal with a phone number verification service when a user signs up for instant messaging.. But Twilio is the victim of a phishing attack, and in the fall condemned Signal and the data of 2,000 users.
How did this attack work? It directly affected Twilio employees, who were asked by the company’s fake IT department to log back into their accounts. You know fishing. The fraudsters copied the IT department’s interface to play on the gullibility of employees. And it worked. When the employees followed the fraudulent link, the fraudsters gained access to the credentials. Thus, they were able to attack Signal users.
What email data was stolen?
As soon as Signal became aware of the scam, a statement was released. The messaging app starts by notifying 1,900 users. A hacker can try to re-register the number on another device or find out that the number is registered on Signal. On the other hand, and this is good news, no other data was affected (for example message history, contact lists, profile information or other personal data). Why ? Because they are not stored in the Signal servers. They are saved directly on the device.
The application specifies that the hacker behind this massive phishing campaign was actually looking for three numbers. He was able to get one. Therefore, he was able to send messages using the victim’s account. To remain silent, Signal users must re-register in the app (if prompted) and enable the Record Blocking feature (in Settings). We advise you to do this to be safe because this option is simply designed with the possibility of a scam of this type in mind.
Phishing requires many victims
It’s a scam that relies on a childishly simple but devilishly effective system. Scammers simply pretend to be an official organization. The victims believe they are in the right place and are being guided. They end up providing their personal data. And it’s already too late. This information is in the hands of malicious people, who sometimes go so far as to drain the victim’s accounts.
Often, certain official bodies issue press releases to indicate that they are targets of criminals. This is the case with CAF or the postal service, often copied to allow fraudsters to recover sums of money.
To give you an example of phishing, you have no doubt been confronted with incessant calls, emails and/or SMS regarding CPF. The fraudsters are actually going into overdrive. Their goal is simple. Ithey will restore access to your account to suck up all the euros on it. To avoid falling into the trap, start from a simple observation, valid for all scams.
You should simply never fill out personal information by clicking on a link received via email. If in doubt, go to the official website yourself without going through a link received via email. Scammers are good. For example, they send you an email pretending to be CAF. And the page they make for the occasion looks like two drops of water to the official page.