CISA Warning: Commercial Spyware Actively Targeting Messaging App Users
The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.

The Threat Landscape
CISA's alert reveals that threat actors are deploying multiple tactics to compromise messaging application users. These include phishing campaigns using malicious device-linking QR codes that compromise victim accounts and link them to attacker-controlled devices, zero-click exploits requiring no user interaction whatsoever, and impersonation of legitimate messaging platforms like Signal and WhatsApp.
The zero-click exploit capability is particularly concerning. These attacks succeed without any action from the device user—no clicking malicious links, no downloading suspicious files, no entering credentials. The exploitation occurs silently in the background, making detection extremely difficult for even security-conscious users.
Who's Being Targeted
Whilst current targeting remains opportunistic, evidence suggests these threat actors focus particularly on high-value individuals. Primary targets include current and former high-ranking government, military, and political officials, as well as civil society organisations and individuals across the United States, Middle East, and Europe.
The US House of Representatives has already taken action, banning WhatsApp on House devices following concerns about these threats. This decision reflects the seriousness with which government entities are treating the spyware risk to messaging applications.
The Commercial Spyware Problem
The alert specifically highlights commercial spyware—sophisticated surveillance tools developed by private companies and sold to governments and other actors. These tools represent a growing threat category that sits between nation-state capabilities and commodity malware.
Commercial spyware like NSO Group's Pegasus has been used in high-profile attacks against journalists, activists, and political figures globally. A landmark case saw a judge bar NSO from targeting WhatsApp users with spyware, though enforcement of such orders remains challenging when dealing with international actors.
Recent discoveries include LANDFALL, described as commercial-grade Android spyware in exploit chains targeting Samsung devices, and various campaigns impersonating messaging platforms to distribute malicious applications.
Attack Techniques Explained
Malicious QR Codes: Attackers create fraudulent QR codes that, when scanned, initiate device-linking processes connecting the victim's messaging account to attacker-controlled devices. This gives attackers real-time access to all messages, contacts, and media shared through the compromised account.
Zero-Click Exploits: These sophisticated attacks exploit vulnerabilities in messaging applications themselves, requiring no user interaction. WhatsApp has patched multiple zero-click vulnerabilities affecting iOS and macOS devices, but the discovery of such flaws demonstrates that messaging platforms remain vulnerable to advanced exploitation techniques.
Platform Impersonation: Threat actors create fake versions of legitimate messaging applications or phishing sites mimicking official download pages. ClayRat, a recently discovered Android spyware, has been distributed through campaigns impersonating Signal and ToTok messengers, using Telegram and phishing sites for distribution.
Regional Targeting Patterns
Evidence shows targeting across multiple regions. Russian-aligned threat actors have been observed actively targeting Signal Messenger users. In the UAE, researchers have uncovered spyware specifically targeting messaging app users in that region. European users have also been targeted through campaigns like ClayRat that use Telegram and phishing sites for distribution.
This geographical spread indicates that commercial spyware targeting messaging applications represents a global threat, not isolated to specific regions or political contexts.
CISA's Protective Guidance
CISA strongly encourages messaging app users to review updated Mobile Communications Best Practice Guidance and guidance on mitigating cyber threats with limited resources specifically designed for civil society organisations.
Key protective measures include:
Use Official Sources: Only download messaging applications from official app stores or verified sources. Never install applications from links in unsolicited messages or emails.
Be Cautious with QR Codes: Don't scan QR codes from untrusted sources, particularly those claiming to offer account linking, verification, or enhanced features for messaging applications.
Keep Software Updated: Install security updates promptly for both messaging applications and mobile operating systems. Many zero-click exploits target known vulnerabilities that patches have addressed.
Enable Security Features: Use all available security features including two-factor authentication, security notifications for new device logins, and encrypted backup options where available.
Verify Unusual Activity: Watch for signs of compromise including unexpected battery drain, unusual data usage, messages you didn't send, or contacts reporting suspicious messages from your account.
Limit Sensitive Communications: For truly sensitive discussions, particularly those involving government, military, or political matters, consider whether messaging applications represent appropriate communication channels.
The Broader Context
This alert arrives amid growing scrutiny of commercial spyware vendors and increased awareness of how sophisticated surveillance tools have proliferated beyond traditional intelligence agencies. The commoditisation of advanced exploitation techniques means that capabilities once limited to nation-states are now available to a much broader range of actors.
For organisations and individuals who are potential targets—government officials, political figures, activists, journalists, and civil society members—the threat environment has fundamentally changed. Messaging applications that seemed secure now face sophisticated attacks from well-resourced adversaries using commercial tools specifically designed to compromise them.
What This Means for Users
The uncomfortable reality is that messaging application security faces threats that many users cannot fully defend against individually. Zero-click exploits, by definition, succeed without user error. Even security-conscious individuals following best practices remain vulnerable to sophisticated commercial spyware.
This doesn't mean abandoning messaging applications entirely—they remain more secure than many alternatives for everyday communications. However, users must adjust their threat models and communication practices based on realistic assessment of risks.
High-value targets should assume their messaging applications may be compromised and adjust sensitive communications accordingly. Civil society organisations and individuals facing elevated risk should seek expert guidance on protective measures appropriate to their specific threat profiles.
For everyday users, maintaining updated software, using official application sources, and exercising caution with QR codes and suspicious messages remains essential. Whilst these measures won't prevent zero-click exploits, they protect against the more common social engineering attacks that represent the majority of successful compromises.












