Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.002
Phishing: Spearphishing Link / Social Engineering
T1539
Steal Session Credentials (verification codes/PINs)
T1098
Account Manipulation (renaming hijacked accounts)
T1136.003
Cloud Account (Abusing application linking features)
CVE Profile
N/A [CISA KEV Status: Inactive].
The attack exploits human trust rather than software flaws.
Constraint
The structure resembles a pure credential and session harvesting operation. While hard IOCs are absent, the telemetry confirms attackers modify account display names to strings such as "Deleted account" to evade detection in group chats. The actors also weaponize the "linked devices" functionality to enable remote surveillance.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue immediate organizational communication prohibiting the transmission of classified or sensitive information over commercial messaging apps (Signal, WhatsApp).
DETECT (DE) – Monitoring & Analysis
Command
Audit all enterprise-managed group chats for unauthorized duplicate members or accounts displaying anomalous naming conventions like "Deleted account".
RESPOND (RS) – Mitigation & Containment
Command
Direct group administrators to immediately remove unrecognized accounts or accounts that join via a stolen group link.
Command
If a group administrator account is suspected of compromise, disband the group immediately and re-establish a new channel.
RECOVER (RC) – Restoration & Trust
Command
Verify the identity of potentially compromised users via out-of-band communication (e.g., standard email or a normal cellular call).
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Mandate targeted security awareness training focusing on chatbot impersonation and multi-factor authentication (MFA) code security.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect any unrecognized sessions immediately by navigating to the "linked devices" menu in your Signal or WhatsApp application settings.
Command
Never share verification codes or PINs with anyone, including accounts claiming to be official support.
Priority 2: Identity
Command
Verify duplicate contacts in your chat groups by calling them on a standard phone line to confirm their account status.
Priority 3: Persistence
Command
Check your chat groups for dormant users that have recently changed their display name to "Deleted account". Remove them if you hold administrative privileges.
Hardening & References
Baseline
CIS Benchmarks for Mobile Device Management (MDM).
Framework
NIST CSF 2.0 (PR.AT-1: Awareness and Training; PR.AA-1: Identity Management).
Style Note
Application-level encryption, such as E(m,k) utilized in end-to-end messaging, secures data in transit. However, it provides zero protection against endpoint compromise or authorized session hijacking facilitated by social engineering.
Source
General Intelligence and Security Service (AIVD) - Netherlands
NL Times - Intelligence confirms Russian state hackers targeting Dutch Signal and WhatsApp accounts