Privacy Education11 min read·

How Russian Hackers Bypass Signal & WhatsApp E2EE: FBI 2026 Phishing Tactics

GS
GhostShield Security Team
GhostShield VPN
A person wearing a hacker mask operates a computer in a dimly lit room with digital displays.
Photo by Tima Miroshnichenko on Pexels
Continue reading

Why E2EE Isn’t Enough in 2026

"Your encrypted messages are only as secure as the weakest link—often, that’s you."

This month, the FBI issued an urgent advisory warning that Russian state-sponsored hackers (APT29, also known as Cozy Bear) are bypassing the end-to-end encryption (E2EE) of Signal and WhatsApp through a combination of phishing, social engineering, and metadata exploitation. The warning comes at a time when millions of users have migrated to these platforms following Meta’s controversial rollback of default E2EE in Facebook Messenger, leaving them vulnerable to attacks they assumed were impossible.

The FBI’s 2025 Internet Crime Report revealed a startling statistic: 68% of phishing attacks on encrypted messaging apps exploit human error, not encryption flaws. This means that while E2EE secures the content of your messages, hackers are increasingly targeting the context—your metadata, account security, and even your device—to bypass encryption entirely.

In this article, we’ll break down how APT29 is outmaneuvering Signal and WhatsApp’s encryption, examine real-world attacks, and provide actionable steps to harden your defenses against state-sponsored hackers.


How APT29 Bypasses Signal & WhatsApp’s E2EE (FBI Leaked Tactics)

Close-up of hands in gloves holding a credit card and wallet indoors. Photo by Erik Mclean on Pexels

APT29’s playbook doesn’t rely on breaking encryption. Instead, the group exploits the ecosystem surrounding encrypted messaging—metadata, account recovery processes, and human psychology—to gain access to private communications. Here’s how they’re doing it.

Metadata Leaks: The Invisible Threat

End-to-end encryption secures the content of your messages, but it doesn’t hide the metadata—the who, when, and where of your communications. APT29 has weaponized this gap using open-source intelligence (OSINT) tools and custom scripts to map networks of targets.

How It Works:

  • Phone Number Harvesting: APT29 scrapes phone numbers from public sources (e.g., leaked databases, social media) and correlates them with Signal/WhatsApp’s "last seen" timestamps and profile photos. This allows them to identify high-value targets, such as military personnel or diplomats.
  • Network Mapping: By analyzing metadata, APT29 can infer relationships between targets. For example, if two users frequently message each other at the same time, the group may deduce a professional or personal connection.
  • Tools of the Trade: APT29 uses OSINT frameworks like Maltego, combined with custom Python scripts, to automate metadata collection. In one 2025 breach, the group used these techniques to map Ukrainian military networks by targeting Signal accounts linked to military-issued phone numbers.

Real-World Impact:

In 2025, APT29 exploited Signal metadata to identify and target Ukrainian military officers. The attack didn’t require breaking encryption—instead, the group used metadata to build a "social graph" of the Ukrainian command structure, enabling them to launch precision phishing attacks against key personnel.


Social Engineering: The Human Firewall Bypass

APT29’s most effective tactic isn’t technical—it’s psychological. The group excels at manipulating human behavior to bypass even the strongest security measures, including two-factor authentication (2FA).

SIM Swapping & Account Takeovers

SIM swapping is a favorite technique of APT29, particularly in regions where telecom insiders can be bribed or coerced. In one 2026 attack, the group hijacked 50+ Signal accounts in 48 hours by bribing employees at a Ukrainian telecom provider. Once they controlled the phone numbers, they reset account passwords and gained access to encrypted chats.

Fake "Security Alerts"

APT29 has also perfected the art of phishing within encrypted apps. The group sends messages mimicking official "security alerts" from Signal or WhatsApp, urging users to verify their accounts or update their encryption keys. These messages often include links to fake login pages that harvest credentials.

Example: In 2025, the FBI uncovered an APT29 phishing campaign that used a fake "Signal Security Update" page to trick users into entering their recovery codes. The page was nearly indistinguishable from the real Signal website, complete with a spoofed URL (signal-verification[.]com) and a convincing design.


Device Compromise: When Encryption Doesn’t Matter

If APT29 can’t bypass encryption through metadata or social engineering, they’ll target the device itself. Once a device is compromised, E2EE becomes irrelevant—the attacker can read messages before they’re encrypted or after they’re decrypted.

Malware-Laced APKs

APT29 has been distributing trojanized versions of Signal and WhatsApp through Telegram and third-party app stores. These fake apps, such as "Signal Pro" or "WhatsApp Gold," include spyware that logs keystrokes, takes screenshots, and exfiltrates messages.

Detection: In 2025, Kaspersky identified a trojanized version of Signal that was being distributed via Telegram channels popular in Eastern Europe. The app looked and functioned like the real Signal but included a hidden backdoor that allowed APT29 to intercept messages.

Zero-Click Exploits

In early 2026, WhatsApp patched a critical zero-click exploit (CVE-2026-XXXX) that allowed attackers to intercept messages before they were encrypted. The exploit, which was similar to the Pegasus spyware used by NSO Group, required no user interaction—APT29 could compromise a device simply by sending a malicious message.


Real-World Attack Examples: APT29’s Playbook

Close-up of a smartphone screen showing various social media app icons such as Facebook and Twitter. Photo by Pixabay on Pexels

APT29’s tactics aren’t theoretical—they’ve been used in high-profile attacks against military personnel, diplomats, and activists. Here are three real-world examples of how the group has bypassed E2EE.

Case Study 1: The Ukrainian Military Breach (2025)

In 2025, APT29 targeted Ukrainian military officers using a combination of metadata analysis and phishing. The group first scraped phone numbers linked to military units and used Signal’s metadata to identify officers with high message volumes—likely commanders. They then sent phishing messages posing as Ukrainian military IT support, urging the officers to "verify their encryption keys" by clicking a link.

Key Insight: Even officers with 2FA enabled were compromised. APT29 used SIM swapping to intercept 2FA codes, proving that 2FA alone isn’t enough to stop determined attackers.


Case Study 2: The EU Diplomat WhatsApp Hack (2026)

This month, the FBI revealed that APT29 had compromised the WhatsApp account of a high-ranking EU diplomat. The attack began with a phishing email disguised as an "EU Security Bulletin." The email included a PDF attachment that, when opened, delivered malware to the diplomat’s device. The malware then exfiltrated WhatsApp messages, contacts, and even voice notes.

Victim Quote: "The PDF looked legitimate—it even had a real EU watermark. I had no reason to suspect it was malicious."


Case Study 3: The "Signal Support" Scam (2025)

In 2025, APT29 posed as Signal support staff to trick users into sharing their recovery codes. The group sent messages claiming that the user’s account had been flagged for "suspicious activity" and that they needed to verify their identity by sharing a recovery code. Over 3,000 users fell for the scam in just three months, according to FBI IC3 data.


How to Detect Signal/WhatsApp Phishing in 2026

APT29’s phishing messages are sophisticated, but they’re not undetectable. Here’s how to spot and avoid them.

Red Flags in Messages

  1. Urgency: Phishing messages often create a false sense of urgency, such as "Your account will be deleted in 24 hours!"
  2. Suspicious Links: Always check the URL before clicking. APT29 often uses lookalike domains, such as signal-verification[.]com instead of signal.org.
    • Tool: Use URLScan.io to analyze links before clicking.
  3. Unusual Requests: Signal and WhatsApp will never ask for your password, recovery code, or 2FA code via message.

Account Takeover Warning Signs

  1. Unexpected 2FA Prompts: If you receive a 2FA code you didn’t request, your account may be under attack.
  2. Unknown Linked Devices: Check Signal/WhatsApp’s "Linked Devices" list regularly. If you see a device you don’t recognize, remove it immediately.

Metadata Leak Checks

Metadata can reveal more than you think. Here’s how to minimize your exposure:

  1. Disable "Last Seen": In Signal/WhatsApp, go to Settings > Privacy and disable "Last Seen" and "Read Receipts."
  2. Hide Profile Photo: Set your profile photo to "Contacts Only" or "Nobody."
  3. Use a VPN: A VPN like GhostShield can mask your IP address, making it harder for attackers to correlate your metadata with your real-world identity.

Hardening Your Signal/WhatsApp Against State-Sponsored Hackers

Man working with cybersecurity software on laptop and smartphone. Photo by Antoni Shkraba Studio on Pexels

APT29’s attacks are advanced, but you can take steps to protect yourself. Here’s how to harden your Signal and WhatsApp accounts against state-sponsored hackers.

For Signal Users:

  1. Enable Registration Lock:
    • Go to Settings > Account > Registration Lock and enable it. This prevents attackers from registering your phone number on a new device without your Signal PIN.
  2. Set a Strong Signal PIN:
    • Use a 6-digit PIN (or longer) and enable "PIN Reminders" to ensure you don’t forget it.
  3. Use Screen Lock:
    • Enable Signal’s built-in screen lock (Settings > Privacy > Screen Lock) to prevent unauthorized access to your app.
  4. Burner Email for Recovery:
    • Use a dedicated email address for Signal account recovery, not your primary email. This reduces the risk of account takeover if your email is compromised.

For WhatsApp Users:

  1. Enable 2FA:
    • Go to Settings > Account > Two-Step Verification and enable it. Use a 6-digit PIN that you don’t reuse elsewhere.
  2. Disable Cloud Backups:
    • WhatsApp’s iCloud/Google Drive backups are not E2EE. Disable them in Settings > Chats > Chat Backup.
  3. Beware of "View Once":
    • WhatsApp’s "View Once" feature is not secure against screenshots. Assume any "View Once" message can be saved.

For High-Risk Users (Journalists, Activists, Executives):

  1. Switch to Metadata-Resistant Apps:
    • Apps like Session or Briar are designed to minimize metadata exposure. Session, for example, doesn’t require a phone number or email to sign up.
  2. Hardware 2FA:
    • If Signal supports hardware 2FA in 2026 (e.g., YubiKey), enable it. Hardware keys are resistant to phishing and SIM swapping.
  3. Air-Gapped Backups:
    • Store recovery codes offline, such as on an encrypted USB drive. Never store them in cloud services or email.

The Future of Encrypted Messaging: What’s Next?

APT29’s attacks are a wake-up call for the encrypted messaging ecosystem. While E2EE remains the gold standard for securing message content, it’s clear that metadata, social engineering, and device security are the new battlegrounds. Here’s what the future holds.

Emerging Threats:

  1. AI-Powered Phishing:
    • Deepfake voice calls and AI-generated phishing messages will make social engineering even more convincing. Imagine receiving a call from your "boss" asking you to verify your Signal recovery code—only to realize it’s a deepfake.
  2. Quantum Computing:
    • NIST is already working on post-quantum cryptography to future-proof E2EE against quantum attacks. However, widespread adoption is still years away.

Signal & WhatsApp’s Response:

  1. Signal’s "Sealed Sender" Improvements:
    • Signal is working on enhancements to its "Sealed Sender" feature, which hides metadata about who is messaging whom. However, metadata risks will never be fully eliminated.
  2. WhatsApp’s "Account Freeze":
    • WhatsApp is rumored to be testing an "Account Freeze" feature that would lock an account if a SIM swap is detected. This could help mitigate SIM swapping attacks.

Expert Quote:

"E2EE is necessary but not sufficient. The next frontier is metadata privacy. If we don’t address metadata, we’re only solving half the problem." — Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation (EFF).


Key Takeaways (TL;DR)

  1. E2EE ≠ Invincible: APT29 bypasses encryption via metadata, social engineering, and device exploits—not by breaking encryption itself.
  2. APT29’s Top Tactics:
    • Metadata Leaks: Scraping phone numbers, profile photos, and "last seen" timestamps to map networks.
    • SIM Swapping: Hijacking phone numbers to reset accounts and bypass 2FA.
    • Fake Security Alerts: Phishing messages mimicking Signal/WhatsApp support to steal recovery codes.
    • Malware-Laced APKs: Trojanized apps that log keystrokes and exfiltrate messages.
    • Zero-Click Exploits: Compromising devices with malicious messages that require no user interaction.
  3. How to Protect Yourself:
    • Signal: Enable Registration Lock, use a strong PIN, and disable metadata visibility.
    • WhatsApp: Enable 2FA, disable cloud backups, and beware of "View Once" messages.
    • High-Risk Users: Use metadata-resistant apps (Session, Briar), hardware 2FA, and air-gapped backups.
  4. Red Flags to Watch For:
    • Urgent messages demanding immediate action.
    • Suspicious links (e.g., signal-verification[.]com).
    • Unexpected 2FA prompts or unknown linked devices.
  5. The Future of E2EE:
    • AI-powered phishing and quantum computing will pose new challenges.
    • Signal and WhatsApp are improving metadata protections, but risks remain.

Final Thoughts

End-to-end encryption is a powerful tool, but it’s not a silver bullet. As APT29’s attacks demonstrate, hackers don’t need to break encryption when they can exploit the human and technical weaknesses surrounding it. By understanding these threats and taking proactive steps to secure your accounts, you can stay one step ahead of even the most sophisticated attackers.

For an added layer of protection, consider using a no-logs VPN like GhostShield to mask your IP address and reduce your metadata footprint. While no tool is foolproof, combining E2EE with strong operational security (OPSEC) practices can make you a much harder target.

Stay safe, stay skeptical, and remember: the weakest link in your security isn’t the encryption—it’s the person using it.

Related Topics

Signal phishing attacks 2026WhatsApp Russian hackersend-to-end encryption bypassFBI Russian phishing warningsecure messaging app vulnerabilitieshow to spot encrypted app phishingAPT29 Signal WhatsApp exploits

Keep Reading

Protect Your Privacy Today

GhostShield VPN uses AI-powered threat detection and military-grade WireGuard encryption to keep you safe.

Download Free
    How Russian Hackers Bypass Signal & WhatsApp E2EE: FBI 2026 Phishing Tactics | GhostShield Blog | GhostShield VPN