How Russian spies were exposed at Signal

5 August 2024 2 minutes Author: Newsman

Serhii Flesh, a specialist in radio technologies and a military engineer, noted that one of the main problems is the use of mobile phones of dead or captured soldiers by the enemy. This allows Russians to read combat messages, because group administrators in Signal do not always monitor the security of chats. “There are often hundreds of participants in such professional and military communities, you can’t check everyone,” Serhiy explained.

The spies often used the Ukrainian language and knew the numbers of the brigades and the callsigns of the commanders, but they had no in-depth knowledge of military operations. To identify suspicious persons, Serhii Flesh and his colleagues offered video calls, which helped to weed out spies who could not confirm their identity.

The story began with Russian agents infiltrating military groups at Signal using forged documents. After that, they themselves created new groups and invited the military to them, becoming administrators. In this way, they gained access to important information and could observe discussions of hostilities.

The protection of military groups in messengers requires careful control and verification of participants, in particular through video calls and the use of specialized services for document verification. Sergey Flesh recommends considering unknown persons in military groups as potential spies and using Delta to check military documents. It is important to remain vigilant and not trust unknown persons.

Other related articles
News
Read more
DDoS attacks targeting Discord
Panamorfi: New DDoS Campaign Targets Discord, Uses Minecraft DDoS Package Via Misconfigured Jupyter Notebooks. Aqua Security detected and blocked the attack with its runtime protection solution.
273
Found an error?
If you find an error, take a screenshot and send it to the bot.