Event JSON
{
"id": "4469cf25e3a21cbc1fb2bf4c0ec12efa3e79f01c8a54b653f5ad330ac2574e29",
"pubkey": "17538dc2a62769d09443f18c37cbe358fab5bbf981173542aa7c5ff171ed77c4",
"created_at": 1740013731,
"kind": 9802,
"tags": [
[
"r",
"https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger",
"source"
],
[
"comment",
"Linked devices and QR as an exploit avenue in signal"
]
],
"content": "Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim's account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim's secure conversations without the need for full-device compromise.",
"sig": "b1bd983f68cc867191626a63068e8298065dcb2d447a99e71e5878d9d7da7f9de7883282847fddf191745ad2111619ef4e26ea63e6720e60a83b9d8e73e16b44"
}