Signal responds to reports: no hack, but targeted phishing campaign

28 April 2026 09:08 CEST

Following recent reporting in Germany, Signal has issued a detailed response to clarify the situation and address concerns about its security. The non profit organisation stresses that Signal itself was not hacked, and that encryption, infrastructure, and the integrity of the app’s code was not compromised.

Instead of a technical breach, the incident involved a sophisticated phishing campaign. Attackers posed as “Signal Support” by changing their profile display name and using social engineering techniques to gain trust. Victims were manipulated into sharing sensitive information such as verification codes, which enabled attackers to take over their accounts.

The use of the term “hack” in some reports is therefore misleading, as there was no intrusion into Signal’s technical infrastructure.

How the attack unfolded

Because Signal doesn’t collect user data, much of its understanding of the attacks comes directly from those who were targeted.

Based on victim reports, Signal describes a clear pattern in how the attacks were carried out. After gaining access to login credentials, attackers would take control of the account and often change the linked phone number. Victims were told that being logged out was expected behavior and were encouraged to “re-register.” Believing they were restoring access, they unknowingly created new accounts while their original ones remained compromised. As a result, many didn’t notice the takeover, allowing attackers to use hijacked accounts to contact people in their networks.

New changes to help hinder attacks

Signal acknowledges that phishing and social engineering affect all major messaging platforms. However, the organisation notes that the consequences are particularly serious given the high level of trust users place in its service.

The incidents highlight a broader reality in cybersecurity: even strong technical defenses can’t prevent attackers from exploiting human behavior.

In response, Signal says it will roll out new measures in the coming weeks to help prevent and detect phishing attempts. Specific details have not yet been disclosed.

Stay alert

Signal urges users to remain cautious and aware of potential scams. It reiterates that Signal Support will never ask for verification codes or PINs through messages. Users are also encouraged to enable Registration Lock (Settings > Account > Registration Lock) to add an extra layer of protection.

For those who want more information about how attackers work and how to protect yourself on Signal, read our article: Phishing-Versuche auf Signal – Wie sie funktionieren und wie du dich schützen kannst.

Signal’s full response can be read on social media BlueskyMastodon folgst und X reagiert.

A response to recent reporting in Germany, in service of clarity and accountability: First, it’s important to be precise when it comes to critical infrastructure like Signal. Signal was not “hacked” — in that our encryption, infrastructure, & the integrity of the app’s code was not compromised. 1/

— Signal (@signal.org) 27 april 2026 om 22:53

Informiert bleiben

Möchtest du die neuesten Signal Neuigkeiten, Tipps und Updates erhalten? Folge uns auf Bluesky oder bei Mastodon folgst.

Privat teilen über Signal:

oder mit weniger Datenschutz teilen:

Noch nicht auf Signal? Probiere es aus!

Ähnliche Artikel.

Letzte News.