Connect with us
DAPA Banner

Crypto World

FBI Issues Urgent Warning as Russian Hackers Target Signal Users and Compromise Thousands of American Accounts

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR:

  • Russian intelligence-linked hackers have compromised thousands of Signal accounts through targeted phishing campaigns globally.
  • High-value targets include current and former U.S. government officials, military personnel, journalists, and political figures.
  • Signal’s encryption remains unbroken — Russian hackers bypass it by stealing user credentials through social engineering.
  • The FBI urges Americans to never share PINs or 2FA codes and to report suspicious activity to IC3.gov immediately.

The FBI has issued a stark warning about Russian hackers actively targeting Americans who use Signal and other commercial messaging apps.

Working alongside the Cybersecurity and Infrastructure Security Agency, the bureau confirmed that thousands of individual accounts have already been compromised.

The campaign focuses on high-value targets, including current and former U.S. government officials, military personnel, political figures, and journalists. Authorities stress that Signal’s encryption is not at fault — end users are the primary vulnerability.

FBI Confirms Russian Hackers Are Actively Compromising Signal Accounts Across the Globe

Russian hackers linked to the country’s intelligence services have been running a coordinated phishing campaign against Signal users.

The operation involves sending messages disguised as official CMA support communications to unsuspecting targets. Once a user interacts with the message, the attacker gains full access to their account.

Advertisement

FBI Director Kash Patel publicly confirmed the threat, warning Americans through an official statement on X.

After gaining access, Russian hackers can read private messages and browse full contact lists. They can also send messages while posing as the account owner. This creates a chain of trust-based attacks that are difficult for recipients to detect.

Advertisement

The phishing messages are carefully tailored to each target, making them appear legitimate and urgent. Victims are typically asked to click a link, provide a verification code, or submit an account PIN. Any of these actions immediately hands control of the account to the attacker.

Authorities noted that the campaign continues to evolve. Russian hackers may expand their methods to include malware designed to infect victim devices directly. This development moves the threat beyond social engineering into more technically advanced territory.

Signal’s end-to-end encryption remains fully operational and has not been breached. However, the FBI warned that phishing renders encryption irrelevant when attackers access accounts directly. No level of encryption can protect a user who unknowingly hands over their credentials.

What Americans Can Do Right Now to Protect Their Signal Accounts

The FBI and CISA released joint guidance to help Americans defend against the ongoing Russian hacker campaign.

Advertisement

The first step is straightforward: stop all interaction the moment a message feels suspicious. Users should never share PINs or two-factor authentication codes for actions they did not personally initiate.

Any unsolicited message requesting account information should be treated as a potential phishing attempt. Even messages appearing to come from known contacts warrant caution if they contain unusual requests.

When uncertain, users should contact the sender through a completely separate channel before responding.

Group chats also need to be monitored carefully for unauthorized participants. Users should scan participant lists regularly for duplicate or unfamiliar accounts.

Advertisement

Any anomaly should be verified through secure communication outside of the app before further messages are shared.

The FBI reminded Americans that legitimate Signal support never sends verification links through direct messages.

Real support teams communicate exclusively through official email channels and never request codes or PINs inside the app. Any message claiming otherwise is almost certainly a phishing attempt by Russian hackers.

Americans who suspect they have been targeted should report the activity to the Internet Crime Complaint Center at IC3.gov or contact their nearest FBI field office.

Advertisement

Organizational IT and security teams should also be notified immediately. Fast reporting strengthens the FBI’s ability to track the campaign and protect additional accounts from being compromised.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Bitcoin Mining Difficulty Drops 7.7% in Biggest Cut Since February

Published

on

Bitcoin Mining Difficulty Drops 7.7% in Biggest Cut Since February

Bitcoin’s mining difficulty fell by around 7.7% at the latest adjustment on March 20 to 133.79 trillion at block 941,472, the sharpest drop since February, according to CoinWarz data.

The latest move takes difficulty down from around 145 trillion in mid-March and roughly 148 trillion at the start of the year. A lower difficulty means it takes less computational work to earn the same block reward, slightly improving revenue per unit of hashrate for firms that stay online.

The adjustment followed slower-than-target block production over the prior 2,016 blocks. CloverPool data showed average block times at about 12 minutes 36 seconds, well above Bitcoin’s 10-minute target, forcing the network to recalibrate lower.

In February, difficulty dropped sharply after weather-related disruptions in the United States temporarily knocked large American mining facilities offline, and it later rebounded by about 15% as hashrate returned to the network once power conditions normalized. 

Advertisement

Bitcoin (BTC) difficulty measures how hard it is for miners to find a valid hash for the next block and is automatically adjusted to keep issuance steady at one block every 10 minutes.

When more computing power, or hashrate, joins the network, difficulty rises to prevent blocks from being mined too quickly, while a decline in hashrate triggers a lower difficulty, making it easier for remaining miners to earn rewards. 

Bitcoin difficulty drops 7.7%. Source: CoinWarz

Related: Cango reports $285M Q4 loss as Bitcoin mining costs surge in 2025

The next difficulty adjustment is currently estimated for April 3, though that projection changes with each new block.

Miners pivot to AI as power costs bite

The difficulty reset also comes as several listed miners push further into AI and high-performance computing infrastructure in search of steadier returns on power and data-center capacity.

Advertisement

Last week, crypto trader Ran Neuner argued AI had become Bitcoin mining’s biggest competitor as both industries compete for electricity, even going as far as to say that “AI has killed Bitcoin forever.” 

Bitcoin miners such as Core Scientific, MARA Holdings, Hut 8 and Cipher Mining have begun reallocating capacity or pivoting toward AI workloads, while some operators have reduced hashrate or shut down less efficient rigs as profitability tightens.

On Feb 21, Bitdeer liquidated 943 BTC from reserves and sold newly mined coins, cutting corporate holdings to zero. In its latest weekly update on March 21, it confirmed that its BTC holdings remained at zero.

Big questions: Would Bitcoin survive a 10-year power outage?

Advertisement