CISA Warning: Commercial Spyware Actively Targeting Messaging App Users

November 25, 2025

The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.

The Threat Landscape

CISA's alert reveals that threat actors are deploying multiple tactics to compromise messaging application users. These include phishing campaigns using malicious device-linking QR codes that compromise victim accounts and link them to attacker-controlled devices, zero-click exploits requiring no user interaction whatsoever, and impersonation of legitimate messaging platforms like Signal and WhatsApp.


The zero-click exploit capability is particularly concerning. These attacks succeed without any action from the device user—no clicking malicious links, no downloading suspicious files, no entering credentials. The exploitation occurs silently in the background, making detection extremely difficult for even security-conscious users.



Who's Being Targeted

Whilst current targeting remains opportunistic, evidence suggests these threat actors focus particularly on high-value individuals. Primary targets include current and former high-ranking government, military, and political officials, as well as civil society organisations and individuals across the United States, Middle East, and Europe.


The US House of Representatives has already taken action, banning WhatsApp on House devices following concerns about these threats. This decision reflects the seriousness with which government entities are treating the spyware risk to messaging applications.



The Commercial Spyware Problem

The alert specifically highlights commercial spyware—sophisticated surveillance tools developed by private companies and sold to governments and other actors. These tools represent a growing threat category that sits between nation-state capabilities and commodity malware.


Commercial spyware like NSO Group's Pegasus has been used in high-profile attacks against journalists, activists, and political figures globally. A landmark case saw a judge bar NSO from targeting WhatsApp users with spyware, though enforcement of such orders remains challenging when dealing with international actors.


Recent discoveries include LANDFALL, described as commercial-grade Android spyware in exploit chains targeting Samsung devices, and various campaigns impersonating messaging platforms to distribute malicious applications.



Attack Techniques Explained

Malicious QR Codes: Attackers create fraudulent QR codes that, when scanned, initiate device-linking processes connecting the victim's messaging account to attacker-controlled devices. This gives attackers real-time access to all messages, contacts, and media shared through the compromised account.


Zero-Click Exploits: These sophisticated attacks exploit vulnerabilities in messaging applications themselves, requiring no user interaction. WhatsApp has patched multiple zero-click vulnerabilities affecting iOS and macOS devices, but the discovery of such flaws demonstrates that messaging platforms remain vulnerable to advanced exploitation techniques.


Platform Impersonation: Threat actors create fake versions of legitimate messaging applications or phishing sites mimicking official download pages. ClayRat, a recently discovered Android spyware, has been distributed through campaigns impersonating Signal and ToTok messengers, using Telegram and phishing sites for distribution.




Regional Targeting Patterns

Evidence shows targeting across multiple regions. Russian-aligned threat actors have been observed actively targeting Signal Messenger users. In the UAE, researchers have uncovered spyware specifically targeting messaging app users in that region. European users have also been targeted through campaigns like ClayRat that use Telegram and phishing sites for distribution.


This geographical spread indicates that commercial spyware targeting messaging applications represents a global threat, not isolated to specific regions or political contexts.



CISA's Protective Guidance

CISA strongly encourages messaging app users to review updated Mobile Communications Best Practice Guidance and guidance on mitigating cyber threats with limited resources specifically designed for civil society organisations.


Key protective measures include:

Use Official Sources: Only download messaging applications from official app stores or verified sources. Never install applications from links in unsolicited messages or emails.

Be Cautious with QR Codes: Don't scan QR codes from untrusted sources, particularly those claiming to offer account linking, verification, or enhanced features for messaging applications.

Keep Software Updated: Install security updates promptly for both messaging applications and mobile operating systems. Many zero-click exploits target known vulnerabilities that patches have addressed.

Enable Security Features: Use all available security features including two-factor authentication, security notifications for new device logins, and encrypted backup options where available.

Verify Unusual Activity: Watch for signs of compromise including unexpected battery drain, unusual data usage, messages you didn't send, or contacts reporting suspicious messages from your account.

Limit Sensitive Communications: For truly sensitive discussions, particularly those involving government, military, or political matters, consider whether messaging applications represent appropriate communication channels.



The Broader Context

This alert arrives amid growing scrutiny of commercial spyware vendors and increased awareness of how sophisticated surveillance tools have proliferated beyond traditional intelligence agencies. The commoditisation of advanced exploitation techniques means that capabilities once limited to nation-states are now available to a much broader range of actors.


For organisations and individuals who are potential targets—government officials, political figures, activists, journalists, and civil society members—the threat environment has fundamentally changed. Messaging applications that seemed secure now face sophisticated attacks from well-resourced adversaries using commercial tools specifically designed to compromise them.



What This Means for Users

The uncomfortable reality is that messaging application security faces threats that many users cannot fully defend against individually. Zero-click exploits, by definition, succeed without user error. Even security-conscious individuals following best practices remain vulnerable to sophisticated commercial spyware.


This doesn't mean abandoning messaging applications entirely—they remain more secure than many alternatives for everyday communications. However, users must adjust their threat models and communication practices based on realistic assessment of risks.

High-value targets should assume their messaging applications may be compromised and adjust sensitive communications accordingly. Civil society organisations and individuals facing elevated risk should seek expert guidance on protective measures appropriate to their specific threat profiles.



For everyday users, maintaining updated software, using official application sources, and exercising caution with QR codes and suspicious messages remains essential. Whilst these measures won't prevent zero-click exploits, they protect against the more common social engineering attacks that represent the majority of successful compromises.

November 28, 2025
A threat group known as Scattered Lapsus$ Hunters is targeting Zendesk users through a sophisticated campaign involving fake support sites and weaponised helpdesk tickets, according to security researchers at ReliaQuest. The operation represents an evolution in how cybercriminals exploit trust in enterprise SaaS platforms.
November 28, 2025
Amazon Web Services has launched a new feature allowing customers to make DNS changes within 60 minutes during service disruptions in its US East (N. Virginia) region. The announcement tacitly acknowledges what many have long observed: AWS's largest and most critical region has a reliability problem.
November 28, 2025
A Scottish council remains unable to fully restore critical systems two years after a devastating ransomware attack, highlighting the long-term consequences of inadequate cybersecurity preparation and the challenges facing resource-constrained local authorities.  Comhairle nan Eilean Siar, serving Scotland's Western Isles, suffered a ransomware attack in November 2023 that required extensive system reconstruction. According to a report published by Scotland's Accounts Commission, several systems remain unrestored even now, with large data volumes slowing the digital recovery process.
By fahd.zafar November 24, 2025
Microsoft has introduced experimental AI agent capabilities into Windows through Copilot Actions and agent workspaces, features designed to automate everyday tasks like organising files, scheduling meetings, and sending emails. However, the announcement comes with significant security warnings that business leaders and IT administrators must understand before enabling these capabilities.
November 17, 2025
Anthropic has disclosed the first documented case of a large-scale cyberattack executed with minimal human intervention, marking a significant escalation in AI-enabled cyber threats. The campaign, attributed with high confidence to a Chinese state-sponsored group, demonstrates how rapidly AI capabilities are being weaponised for espionage operations.
November 14, 2025
Microsoft has unveiled its first "AI superfactory" - a revolutionary approach to cloud infrastructure that connects multiple datacentres across vast distances to function as a single, unified AI training system. The innovation marks a significant shift in how hyperscale computing infrastructure can be architected.
By fahd.zafar November 14, 2025
The UK's National Savings & Investments bank has spectacularly exceeded its digital transformation budget by £1.3 billion whilst running four years behind schedule, according to a damning National Audit Office report. The programme's failures illustrate how ambitious technology projects collapse under procurement weaknesses, underestimated complexity, and insufficient expertise.
November 7, 2025
For the first time in UK history, a cyberattack has caused sufficient damage to impact the nation's GDP growth. The Bank of England has cited the Jaguar Land Rover breach as a contributing factor to the country's slower-than-expected economic performance, marking a watershed moment in understanding cyber threats as macroeconomic risks.
November 6, 2025
Marks & Spencer has revealed the full financial impact of its April 2025 cyberattack, with total costs reaching £136 million and profits plummeting by more than half. The incident demonstrates how a single cyber breach can devastate even large retailers' financial performance and operational capabilities. 
November 5, 2025
Police forces in England and Wales spend approximately £2 billion annually on technology, with 97% dedicated solely to maintaining legacy systems. This leaves almost nothing for innovation, artificial intelligence, or the service transformation needed to improve policing productivity.