Discussion
Loading...

Discussion

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
Signal
@signalapp@mastodon.world  ·  activity timestamp 3 days ago

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

  • Copy link
  • Flag this post
  • Block
Kevin Karhan :verified:
@kkarhan@infosec.space replied  ·  activity timestamp 3 days ago

@signalapp those attacks.would've not.been successful if you weren't a #proprietary, #centralized, #SingleVendor / #SingleProvider "solution" that doesn't do #SelfCustoy of all the.keys nor allows for #SelfHosting nor demands #PII like #PhoneNumbers that can be leveraged for that.

  • You know what I need to use @monocles / #monoclesChat or @gajim / #XMPP+ #OMEMO?
    • Internet connection and an account on any server.

Can't #phish if one doesn't have credentials for #phishing attacks ffs!

  • Can't get #phished if noone demands, stores, process or even demands such details in the first place!

Also which #Government is that incompetent to not be able to setup their own comms?

  • Copy link
  • Flag this comment
  • Block
Signal
@signalapp@mastodon.world replied  ·  activity timestamp 3 days ago

These attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent “Signal Support Bot”) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.

screenshot of phishing attempt in Signal
screenshot of phishing attempt in Signal
screenshot of phishing attempt in Signal
  • Copy link
  • Flag this comment
  • Block
Signal
@signalapp@mastodon.world replied  ·  activity timestamp 3 days ago

To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

screenshot of Signal SMS verification
screenshot of Signal SMS verification
screenshot of Signal SMS verification
  • Copy link
  • Flag this comment
  • Block
Kevin Karhan :verified:
@kkarhan@infosec.space replied  ·  activity timestamp 3 days ago

@signalapp THERE IS NO LEGITIMATE REASON FOR #Signal TO DEMAND A #PhoneNumber (= #PII by circumstances if not mandatory doxxing to the governments aka. " #KYC")…

  • so yes I do blame Signal because this attack vector is unique to #Signal's shittyness and would not exist with @monocles / #monoclesChat or even cock.li of all places…
  • Copy link
  • Flag this comment
  • Block
Signal
@signalapp@mastodon.world replied  ·  activity timestamp 3 days ago

While we build robust technical safeguards, user vigilance is ultimately the best defense against phishing. We will continue to work on mitigating these risks via interface design and signposting throughout the app. In the meantime, please stay alert, and never share your SMS verification code or Signal PIN with anyone.

https://support.signal.org/hc/en-us/articles/9932566320410-Staying-Safe-from-Phishing-Scams-and-Impersonation

Signal Support

Staying Safe from Phishing, Scams, and Impersonation

We provide a privacy-first, end-to-end encrypted (E2EE) messaging and calling platform designed so only you and your intended recipients can communicate securely. Even with strong encryption, attac...
  • Copy link
  • Flag this comment
  • Block
ExcelAnalytics
@ExcelAnalytics@mastodon.world replied  ·  activity timestamp 3 days ago

@signalapp recipients who are not native English speakers may not notice the giveaways in this and similar scams.

  • Copy link
  • Flag this comment
  • Block
Log in

Encryptr.net Social

This is a forward thinking server running the Bonfire social media platform.

LGBTQA+ and BPOC friendly.

Encryptr.net Social: About · Code of conduct · Privacy ·
Encryptr.net social · 1.0.0-rc.3.6 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login