Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner


Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner

Pierluigi Paganini
April 24, 2026

Germany’s Bundestag President Klöckner was targeted in a Signal phishing attack via a fake CDU group chat.

Germany’s Bundestag President Julia Klöckner has reportedly become the latest European political figure targeted through a Signal-based phishing attack, reported Der Spiegel. The incident is another reminder that even trusted messaging apps can become entry points when attackers go after the person, not the platform.

The attack targeted Klöckner’s phone through a Signal group chat linked to CDU officials. Chancellor Friedrich Merz was reportedly included but not compromised, and at least one other CDU lawmaker was also affected.

“Chancellor Friedrich Merz is also part of the group, although German domestic intelligence reportedly found no evidence his phone had been compromised. Der Spiegel also reported that at least one other CDU lawmaker was affected.” reported Politico.

What makes this case notable is not just the target, but the method. Attackers did not need to break Signal’s encryption. Instead, they appear to have used a phishing-style technique to trick users into revealing sensitive information, including PIN codes. That is a classic example of how cybercriminals often bypass strong technology by exploiting human trust.

The timing is also important. European cybersecurity and intelligence agencies had already warned earlier this month about a campaign in which attackers posed as a fake Signal support chatbot. The goal was simple: lure users into handing over authentication details. Germany’s domestic intelligence service had issued a similar warning in February, which shows that the threat was already known before this incident surfaced.

This matters because Signal has long been viewed as a secure communications tool. The European Commission has recommended since 2020 that officials use it for non-work communication. But secure design does not protect against account takeover, social engineering, or device compromise. If an attacker can get access to the phone number, the verification code, or the PIN, the app’s underlying security can be undermined.

The broader lesson is that messaging apps are only one layer of protection. Security now depends on the entire chain: the device, the account, the recovery process, and the user’s ability to spot deception. A secure app can still be weakened by weak endpoint hygiene, reused credentials, or a convincing fake support message.

For public officials, the risks are even higher. Their communications can expose political strategy, internal discussions, and personal details that attackers can later use for fraud, espionage, or influence operations. That makes identity protection and device hardening just as important as encryption.

Organizations and public bodies should treat this as a warning for their own staff. Any app used for sensitive communication should be backed by strong mobile security controls, phishing awareness, and rapid incident response procedures. Staff should be trained to ignore unsolicited support messages, verify any request through a separate trusted channel, and report suspicious account activity immediately.

There is also a governance issue here. If officials are encouraged to use secure consumer apps for private communication, those apps need to be protected by clear policies on device enrollment, PIN management, and recovery settings. Otherwise, the security benefit is only partial.

The key point is simple: modern attacks often succeed by attacking trust, not encryption. This case shows how a well-designed app can still become part of a compromise when users are deceived into giving away access. For governments and enterprises alike, the answer is not to abandon secure messaging, but to pair it with stronger identity controls, better training, and faster detection of phishing attempts.

In March, a cyberattack targeting Signal and WhatsApp users hit high-ranking German officials, including former BND Vice President Arndt Freytag von Loringhoven. The official reported being contacted by someone posing as Signal support and asked for his PIN. This incident highlights a broader cyber espionage campaign against sensitive individuals in security agencies and political positions.

“He is far from the only prominent victim of the global wave of attacks against user accounts at Signal and WhatsApp. According to SPIEGEL, high-ranking German politicians have reported themselves to the authorities as victims, and active officials in security agencies have also been attacked.” reads the report published by SPIEGEL. Back in February, the Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) classified the attack as “security-relevant” and urged those affected to come forward. The BfV stated that this warning met with a “high response” and that they believe it prevented even worse damage.”

German authorities warned Signal users to check for suspicious signs, such as unknown devices listed under “paired devices” or unexpected prompts to re-register accounts.

In the case of former BND official Arndt Freytag von Loringhoven, attackers used his compromised account to send a malicious link to contacts. He quickly warned them not to open it and deleted his account. Investigators believe the incident is part of ongoing hybrid campaigns linked to Russia. Given Loringhoven’s work on Russian hybrid warfare and his book Putin’s Attack on Germany, he was likely considered a high-value target.

Signal warned that the attacks rely on social engineering, with attackers posing as trusted contacts or fake support services to trick users into sharing verification codes or PINs. The company stressed it will never ask for these details via messages or social media and urged users to stay vigilant and never share login codes.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Bundestag)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


spring-sale-imagery

DeWalt/ZDNET

Spring means lawn and garden prep and DIY projects around the house. And if you’ve been looking for a handy gadget to help you with small repairs and crafts, you can pick up the DeWalt MT21 11-in-1 multitool at Amazon ahead of its Big Spring Sale for 25% off, bringing the price down to $30 (matching the lowest price of the year so far). It also comes with a belt sheath to keep it close by on jobsites.

Also: 10 DIY gadgets I never leave out of my toolkit

The MT21 has a compact design, measuring just 4 inches when fully folded and expanding to 6 inches when the pliers are deployed. The hinged handle is made of durable steel with a rubberized grip in iconic DeWalt yellow and black, adding a bit of visual flair while making the multitool more comfortable to use. Each of the included tools is also made of stainless steel for strength and reliability on jobsites and in the garage.

Also: The best Amazon Spring Sale DeWalt deals

The 11 featured tools include: regular and needlenose pliers, wire cutters, two flathead screwdrivers, a Phillips screwdriver, a file, a can and bottle opener, a saw blade, a straight-edge blade, and an awl tool. Each tool folds into the handle to keep them out of the way until needed and to protect your hands while using the multitool. 

We’re big fans of multitools here at ZDNET, and definitely recommend this highly rated one from DeWalt.

How I rated this deal 

DeWalt is one of the leading names in power tools, and if you’re looking for a handy EDC gadget or just need something for occasional DIY repairs, the MT21 multitool is a great choice. With 11 tools in a single gadget, you can do everything from assembling flat-pack furniture to minor electrical repairs. While not the steepest discount, getting your hands on a high-quality multitool for 25% off is still a great value. That’s why I gave this deal a 3/5 Editor’s rating.

Amazon’s Big Spring Sale runs March 25-31, 2026. 


Show more

Deals are subject to sell out or expire anytime, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings. Our team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We’re sorry if you’ve missed out on this deal, but don’t fret — we’re constantly finding new chances to save and sharing them with you at ZDNET.com


Show more

We aim to deliver the most accurate advice to help you shop smarter. ZDNET offers 33 years of experience, 30 hands-on product reviewers, and 10,000 square feet of lab space to ensure we bring you the best of tech. 

In 2025, we refined our approach to deals, developing a measurable system for sharing savings with readers like you. Our editor’s deal rating badges are affixed to most of our deal content, making it easy to interpret our expertise to help you make the best purchase decision.

At the core of this approach is a percentage-off-based system to classify savings offered on top-tech products, combined with a sliding-scale system based on our team members’ expertise and several factors like frequency, brand or product recognition, and more. The result? Hand-crafted deals chosen specifically for ZDNET readers like you, fully backed by our experts. 

Also: How we rate deals at ZDNET in 2026


Show more





Source link