Russian and Chinese Hackers Running Parallel Global Campaigns Against Messaging Apps and Telecoms
Dutch intelligence warns of large-scale Russian attacks on Signal and WhatsApp while Salt Typhoon continues breaching phone companies worldwide
The Dutch intelligence service revealed that Russian government-affiliated hackers have been systematically targeting users of encrypted messaging applications Signal and WhatsApp in what they describe as a large-scale global operation. The campaign represents a significant escalation in state-sponsored efforts to compromise end-to-end encrypted communications.
Meanwhile, the China-linked Salt Typhoon group has emerged as one of the most prolific hacking operations in recent years, successfully breaching some of the largest American phone and internet companies. The group's reach extends well beyond the United States, with countries across the globe now confirmed as targets of their telecom infiltration campaign.
The parallel campaigns highlight how encrypted messaging and telecom infrastructure have become prime targets for intelligence agencies, with both Russia and China investing heavily in capabilities to intercept or compromise these systems.
Analysis
Why This Matters
The simultaneous campaigns against both encrypted messaging apps and traditional telecom infrastructure represent a pincer movement against private communications globally. Even users who switched to Signal or WhatsApp for security now face targeted state-level attacks.
Background
Salt Typhoon first came to prominence in late 2024 when reports emerged of breaches at major US carriers. The group's operations have since been confirmed across multiple countries and companies.
Key Perspectives
The Dutch intelligence disclosure is notable because the Netherlands rarely makes such direct public attributions, suggesting the scale of the Russian campaign warranted breaking with typical diplomatic caution.
What to Watch
Whether Signal and WhatsApp push protocol-level mitigations, and whether Salt Typhoon's confirmed target list continues to expand.