At the heart of the attacks are widely-used social media platforms that contain exploitable app vulnerabilities and not-so-secure communication automation features

Three techniques are being used in the cyber warfare between Russian and Ukraine threat actors:

  1. Remote phishing: Malicious resources masked as security alerts, as well as legitimate Signal group invites are sent out to entrap victims. The phishing resources redirect recipients to a malicious site and pair their Signal messages to a bad-actor-controlled device.
  2. Tailored phishing: Threat actors use phishing kits tailored to target specialized quarries, such as one mimicking components of the military applications used by armed forces personnel
  3. Exploitation of battlefield-captured devices: The group APT44 (also known as Sandworm) has been implicated in helping threat actors to use linked Signal accounts from devices captured on the battlefield back to actor-controlled infrastructure for follow-on exploitation.