Russian intelligence services targeting Signal messenger
Russian actors associated with the GRU, Russia’s military intelligence organisation, have been using a variety of phishing techniques to gain access to the Signal messenger accounts of personnel in the Armed Forces of Ukraine (AFU), amongst others, according to a threat intelligence report published by Google’s Threat Intelligence Group (GTIG) on the 19th of February.
The group notes that Russia has likely increased its efforts to compromise Signal in light of the application’s use by Ukraine to coordinate and communicate at all levels, but that the tools and techniques used have wider applicability.
Malicious codes

Phishing page crafted to appear as a Signal security alert hosted on UNC4221-controlled domain signal-protect[.]host. Credit: Google Threat Intelligence Team.
Russian groups have approached delivery of these codes in a number of ways; in some cases the QR codes have been masked as legitimate resources from Signal. Group invites, security alerts, or pairing requests. In others, they have deliberately embedded malicious QR codes in phishing pages designed to mimic those of special applications used by Ukraine.
More sinisterly, the Sandworm group, which is known by the designation of APT44 (advanced persistent threat) and is widely accepted to be an element within the GRU, has worked with frontline Russian forces to link captured AFU devices back to Russian infrastructure for exploitation. GTIG notes that this concept of operations provided:
“A low-signature form of initial access due to the lack of centralized, technology-driven detections and defenses that can be used to monitor for account compromise via newly linked devices; when successful, there is a high risk that a compromise can go unnoticed for extended periods of time.”
Targeting fire control

UNC4221 phishing page mimicking the networking component of Kropyva hosted at “teneta.add-group[.]site”. The page invites the user to “Sign in to Signal” (Ukrainian: “Авторизуватись у Signal”), which in turn displays a QR code linked to an UNC4221-controlled Signal instance. Credit: Google Threat Intelligence Team
It now seems that the Russians have tried a similar approach with Kropyva, the software tool now used by Ukraine to coordinate and manage its artillery fire missions. The group known as UNC4221 has developed Signal phishing kit designed to mimic elements of Kropyva, according to the GTIG report. The group used several means to gain access to user devices from creating fake websites masquerading as Kropyva with device linking codes built into them, phishing pages designed to look like Signal security alerts, and phishing pages linked to other phishing infrastructure with device linking codes.
“Notably, as a core component of its Signal targeting, UNC4221 has also used a lightweight JavaScript payload tracked as PINPOINT to collect basic user information and geolocation data using the browser’s GeoLocation API,” the GTIG report states. It adds that this is expected to be a core feature of future targeting of military devices and targeted surveillance.
The report further notes that these activities, and the others that it covers, appear to be a part of a growing demand for offensive cyber capabilities that can be used to target secure messaging apps.
Calibre comment
Personal electronic devices have long been a concern for militaries deploying to operations. At a base level, the signals can be tracked and monitored, as also happened to Ukrainian troops in 2015 through Russia’s Leer-3 electronic warfare system. The signals emitted by a phone can be used to monitor the user’s location with a relatively high degree of accuracy and with a few hours’ latency. Moreover, phones represent an operational security concern. Analysts monitoring Russia’s force build up in the months before the invasion in 2022, were able to tell a lot about their movements from unapproved posts on social media accounts. The presence of Russian soldiers in Belarus was even confirmed through dating apps like Tinder. The costs of poor operational security at the frontlines appear to be known to the Russians and Ukrainians; there are many images of phones nailed to trees, emphasising the need for strict emissions control. However, this latest report from Google indicates that devices far from the frontline are also at risk, and potentially more valuable to an intelligence organisation than those of soldiers coordinating tactical fire missions.

Sign Up for Updates!
Get insider news, tips, and updates. No spam, just the good stuff!