Changeflow GovPing Data Privacy & Cybersecurity NCSC Warns of Russia Actors Targeting Messaging...
Priority review Guidance Added Final

NCSC Warns of Russia Actors Targeting Messaging Apps

Favicon for www.ncsc.gov.uk UK NCSC Alerts & Advisories
Detected April 1st, 2026
Email

Summary

The UK NCSC and international partners issued a joint advisory warning that Russia-based actors are actively targeting high-risk individuals through messaging apps including WhatsApp, Messenger, and Signal. The advisory documents specific attack vectors: social engineering for login codes, unauthorized device linking, undetected group chat access, impersonation, and QR code phishing. High-risk individuals include government officials, political staff, journalists, and others with sensitive information.

What changed

NCSC alongside international partners has identified growing malicious activity from Russia-based actors targeting messaging applications. The advisory outlines five primary attack methods: tricking users into sharing login or account recovery codes, covertly adding attacker devices to accounts, undetected joining of group chats, impersonating known contacts, and phishing via malicious links or QR codes. The advisory specifically references previous targeting of government officials' accounts by APT31, Star Blizzard (FSB), and IRGC.

Organizations with high-risk staff should ensure affected individuals review NCSC guidance on protecting accounts and devices, activate two-step verification and passkeys where available, regularly audit linked devices and group memberships, and use disappearing messages on personal accounts. Government employees should follow the Cabinet Office guidance on non-corporate communications. High-risk individuals may also access NCSC's Individual Cyber Defence services for additional support.

What to do next

  1. Identify high-risk individuals in your organization who may be targeted via messaging apps and brief them on this advisory
  2. Ensure affected staff enable two-step verification/Registration Lock and passkeys on WhatsApp and Signal
  3. Review and update Bring Your Own Device policies to address messaging app security risks

Source document (simplified)

News Download & print article PDF

NCSC warns of messaging app targeting

Alongside international partners, the NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.

What has happened?

Messaging apps such as WhatsApp, Messenger and Signal are an important part of how we communicate every day.

The NCSC and international partners have seen growing malicious activity from Russia-based actors using messaging apps to target high-risk individuals.


Who is affected?

High-risk individuals face a greater likelihood of attacks against their accounts due to a combination of their role and potential access to sensitive information and important people.  You might be a high-risk individual if your work or public status means you have access to, or influence over, sensitive information that could be of interest to threat actors.

The NCSC has previously reported on the targeting of government officials’ accounts by China state-affiliated APT31, Russian Federal Security Service (FSB) actor Star Blizzard and Iran's Islamic Revolutionary Guard Corps (IRGC).

Attackers may attempt to:

  • Trick you into sharing login or account recovery codes.
  • Add their own device to your account without you noticing.
  • Join group chats without detection.
  • Impersonate someone you know.
  • Phish you using malicious links or QR codes.

What should I do?

While anyone can be the victim of social engineering there are key actions you can take to reduce the risks against your personal accounts:

  • Do not share sensitive information via messaging apps.
  • For work communications, use corporately provided messaging services and devices where available and abide by your organisation’s policies.
  • Do not share verification codes or scan unexpected QR codes.
  • Enable two-step verification (for Signal users this is called Registration Lock in Settings).
  • Enable passkeys where available (both WhatsApp and Signal support passkeys).
  • Regularly check for linked devices in settings, review group members and remove or verify any participants you do not recognise independently.
  • Beware of impersonations, unknown contacts and contacts appearing more than once.
  • On personal accounts use disappearing messages that automatically delete after a set period – by turning this on you will limit what a successful attacker could access if they do manage to get in. However, you should have regard to any applicable record keeping requirements.
  • The NCSC’s guidance for high-risk individuals on protecting accounts and devices supports all these recommended actions and includes information on accessing Individual Cyber Defence services to further improve your personal cyber resilience.
  • The following NCSC advice should be considered:

Further advice and resources

Those working in government should follow government guidance on the use of non-corporate communications channels.

Download & print article PDF Share Share Facebook LinkedIn X Copy Link

Published

31 March 2026

Written for

Cyber security professionals Large organisations Public sector

News type

Alert

Was this article helpful?


Guidance

Defending democracy

Blog Post

15 Jan 2025

Passkeys: they're not perfect but they're getting better

Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the NCSC is working to resolve.
Guidance

Top tips for staying secure online

Top tips to ensure you are doing all you can to secure you and your family online

Named provisions

Guidance for High-Risk Individuals on Protecting Accounts and Devices Device Security - Choosing an Enterprise Instant Messaging Solution Secure Communications Principles

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
NCSC
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Government agencies Political organizations Individuals
Industry sector
5112 Software & Technology 9211 Government & Public Administration
Activity scope
Account Security Secure Communications
Threshold
High-risk individuals with access to sensitive information or influence over important decisions
Geographic scope
United Kingdom GB

Taxonomy

Primary area
Cybersecurity
Operational domain
Security
Compliance frameworks
NIST CSF
Topics
Defense & National Security Data Privacy

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when UK NCSC Alerts & Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.