Signal Sabotage: How Hackers Turned a Secure Messenger into a Malware Machine
Ukraine’s CERT-UA reports cyberattacks using compromised Signal accounts to deliver malware to defense staff. These messages, often disguised as meeting reports, lure targets with familiar contacts. Once opened, they deploy DarkTortilla to execute the Dark Crystal RAT. Signal users are advised to disable auto-downloads and check linked devices to avoid such attacks.

Hot Take:
Looks like the bad guys have traded in their black hats for Signal accounts! Ukraine’s CERT-UA is sounding the alarm on hackers who are using your favorite encrypted messaging app to send malware to defense employees. Who knew Signal could signal danger? Time to give your app settings a security makeover before your chat history becomes a hacker’s playground!
Key Points:
- Ukrainian defense employees are being targeted by malware disguised as meeting reports sent via Signal.
- Messages often come from known contacts, increasing the likelihood of them being opened.
- The malware is the DarkTortilla cryptor/loader, which deploys the Dark Crystal RAT.
- Attackers are exploiting Signal’s “Linked Devices” feature to gain unauthorized access.
- Signal users should update their apps, disable automatic downloads, and enable two-factor authentication.
Already a member? Log in here