Concise Summary:
Signal, a popular encrypted messaging app, has stopped responding to requests from Ukrainian law enforcement regarding Russian cyberattacks targeting Ukraine. This shift is concerning as Signal is often used for espionage by Russia against Ukrainian military and government officials. The Ukrainian official who revealed this claims that Signal’s inaction is aiding Moscow’s intelligence efforts. While Signal hasn’t publicly commented, the Ukrainian official suggests potential political instability in the U.S. could be a factor. This development is particularly alarming given previous warnings from researchers about Russian state-backed hackers utilizing Signal for attacks against Ukrainians and other targets.
Key Points:
- Signal has stopped cooperating with Ukrainian law enforcement regarding requests for information on Russian cyberthreats, according to Serhii Demediuk.
- This shift in Signal’s response is being interpreted by the Ukrainian official as aiding Moscow’s intelligence efforts.
- Signal remains a popular platform used by Russian intelligence for espionage targeting military personnel and government officials in Ukraine.
- The Ukrainian government has accused Signal of failing to cooperate with requests for information on how the app is being abused by Russian threat actors.
- Demediuk suggests that Signal’s inaction might be linked to political instability within the United States, but he also expects cooperation to resume soon.
Archive Links:
12ft: https://12ft.io/https://therecord.media/signal-no-longer-cooperating-with-ukraine
archive.org: https://web.archive.org/web/https://therecord.media/signal-no-longer-cooperating-with-ukraine
archive.ph: https://archive.ph/https://therecord.media/signal-no-longer-cooperating-with-ukraine
Original Link: https://therecord.media/signal-no-longer-cooperating-with-ukraine
User Message: Signal no longer cooperating with Ukraine on Russian cyberthreats, official says | The Record from Recorded Future News
For more on bypassing paywalls, see the post on bypassing methods