CISA Warning: Commercial Spyware Actively Targeting Messaging App Users

November 25, 2025

The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.

The Threat Landscape

CISA's alert reveals that threat actors are deploying multiple tactics to compromise messaging application users. These include phishing campaigns using malicious device-linking QR codes that compromise victim accounts and link them to attacker-controlled devices, zero-click exploits requiring no user interaction whatsoever, and impersonation of legitimate messaging platforms like Signal and WhatsApp.


The zero-click exploit capability is particularly concerning. These attacks succeed without any action from the device user—no clicking malicious links, no downloading suspicious files, no entering credentials. The exploitation occurs silently in the background, making detection extremely difficult for even security-conscious users.



Who's Being Targeted

Whilst current targeting remains opportunistic, evidence suggests these threat actors focus particularly on high-value individuals. Primary targets include current and former high-ranking government, military, and political officials, as well as civil society organisations and individuals across the United States, Middle East, and Europe.


The US House of Representatives has already taken action, banning WhatsApp on House devices following concerns about these threats. This decision reflects the seriousness with which government entities are treating the spyware risk to messaging applications.



The Commercial Spyware Problem

The alert specifically highlights commercial spyware—sophisticated surveillance tools developed by private companies and sold to governments and other actors. These tools represent a growing threat category that sits between nation-state capabilities and commodity malware.


Commercial spyware like NSO Group's Pegasus has been used in high-profile attacks against journalists, activists, and political figures globally. A landmark case saw a judge bar NSO from targeting WhatsApp users with spyware, though enforcement of such orders remains challenging when dealing with international actors.


Recent discoveries include LANDFALL, described as commercial-grade Android spyware in exploit chains targeting Samsung devices, and various campaigns impersonating messaging platforms to distribute malicious applications.



Attack Techniques Explained

Malicious QR Codes: Attackers create fraudulent QR codes that, when scanned, initiate device-linking processes connecting the victim's messaging account to attacker-controlled devices. This gives attackers real-time access to all messages, contacts, and media shared through the compromised account.


Zero-Click Exploits: These sophisticated attacks exploit vulnerabilities in messaging applications themselves, requiring no user interaction. WhatsApp has patched multiple zero-click vulnerabilities affecting iOS and macOS devices, but the discovery of such flaws demonstrates that messaging platforms remain vulnerable to advanced exploitation techniques.


Platform Impersonation: Threat actors create fake versions of legitimate messaging applications or phishing sites mimicking official download pages. ClayRat, a recently discovered Android spyware, has been distributed through campaigns impersonating Signal and ToTok messengers, using Telegram and phishing sites for distribution.




Regional Targeting Patterns

Evidence shows targeting across multiple regions. Russian-aligned threat actors have been observed actively targeting Signal Messenger users. In the UAE, researchers have uncovered spyware specifically targeting messaging app users in that region. European users have also been targeted through campaigns like ClayRat that use Telegram and phishing sites for distribution.


This geographical spread indicates that commercial spyware targeting messaging applications represents a global threat, not isolated to specific regions or political contexts.



CISA's Protective Guidance

CISA strongly encourages messaging app users to review updated Mobile Communications Best Practice Guidance and guidance on mitigating cyber threats with limited resources specifically designed for civil society organisations.


Key protective measures include:

Use Official Sources: Only download messaging applications from official app stores or verified sources. Never install applications from links in unsolicited messages or emails.

Be Cautious with QR Codes: Don't scan QR codes from untrusted sources, particularly those claiming to offer account linking, verification, or enhanced features for messaging applications.

Keep Software Updated: Install security updates promptly for both messaging applications and mobile operating systems. Many zero-click exploits target known vulnerabilities that patches have addressed.

Enable Security Features: Use all available security features including two-factor authentication, security notifications for new device logins, and encrypted backup options where available.

Verify Unusual Activity: Watch for signs of compromise including unexpected battery drain, unusual data usage, messages you didn't send, or contacts reporting suspicious messages from your account.

Limit Sensitive Communications: For truly sensitive discussions, particularly those involving government, military, or political matters, consider whether messaging applications represent appropriate communication channels.



The Broader Context

This alert arrives amid growing scrutiny of commercial spyware vendors and increased awareness of how sophisticated surveillance tools have proliferated beyond traditional intelligence agencies. The commoditisation of advanced exploitation techniques means that capabilities once limited to nation-states are now available to a much broader range of actors.


For organisations and individuals who are potential targets—government officials, political figures, activists, journalists, and civil society members—the threat environment has fundamentally changed. Messaging applications that seemed secure now face sophisticated attacks from well-resourced adversaries using commercial tools specifically designed to compromise them.



What This Means for Users

The uncomfortable reality is that messaging application security faces threats that many users cannot fully defend against individually. Zero-click exploits, by definition, succeed without user error. Even security-conscious individuals following best practices remain vulnerable to sophisticated commercial spyware.


This doesn't mean abandoning messaging applications entirely—they remain more secure than many alternatives for everyday communications. However, users must adjust their threat models and communication practices based on realistic assessment of risks.

High-value targets should assume their messaging applications may be compromised and adjust sensitive communications accordingly. Civil society organisations and individuals facing elevated risk should seek expert guidance on protective measures appropriate to their specific threat profiles.



For everyday users, maintaining updated software, using official application sources, and exercising caution with QR codes and suspicious messages remains essential. Whilst these measures won't prevent zero-click exploits, they protect against the more common social engineering attacks that represent the majority of successful compromises.

Ready to move from ideas to delivery?


Whether you’re planning a cloud change, security uplift, cost governance initiative or a digital delivery programme, we can help you shape the scope and the right route to market.


Email:
innovate@altiatech.com or call 0330 332 5842 (Mon–Fri, 9am–5:30pm).


Main contact page: https://www.altiatech.com/contact

Person using a calculator with a tablet on a wooden table.
By Wafik Rozeik February 25, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Digital, pixelated person with red data streams, facing forward. Cyberpunk, data glitch effect.
By Simon Poole February 24, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Person typing on laptop, cloud computing displayed on the screen, on a wooden table.
By Wafik Rozeik February 23, 2026
Explains why AI spend behaves differently and how anomaly management is becoming essential in FinOps to control costs, reduce risk, and improve cloud visibility.
Hand holding a phone displaying the Microsoft Copilot logo with the Microsoft logo blurred in the background.
By Simon Poole February 18, 2026
A practical governance checklist for Microsoft Copilot in 2026, using the Copilot Control System to manage risk, security, compliance, and oversight.
Route to market diagram: Bank to delivery platform, with steps like product mgmt and customer support.
By Simon Poole February 12, 2026
Explains what the Technology Services 4 (TS4) framework means for public sector buyers and how to procure Altiatech services through compliant routes.
Two people shaking hands between cloud data and data analytics dashboards.
By Simon Poole February 10, 2026
Explores where IT waste really comes from and how FinOps helps organisations regain control of cloud spend, improve efficiency, and turn cost visibility into advantage.
People discussing data and cloud infrastructure, near a government building.
By Simon Poole February 9, 2026
An overview of CCS Digital Outcomes 7 explaining Altiatech’s routes to market and how public sector organisations can procure services.
January 26, 2026
Cyberattacks, system failures, natural disasters, and human errors will occur—the question isn't if but when. Cyber resilience planning ensures organisations can withstand incidents, maintain critical operations during disruptions, and recover quickly when systems fail. It's not just about preventing attacks; it's about ensuring business continuity regardless of what goes wrong.
January 19, 2026
Manual user provisioning - the process of creating accounts and granting access through email requests and IT tickets - seems manageable for small organisations. As organisations grow, this approach creates mounting security risks, operational inefficiencies, and frustrated users waiting days for access they need immediately.
January 12, 2026
Multi-cloud strategies deliver flexibility, redundancy, and the ability to select the best platform for each workload. They also create complex security challenges, particularly around identity and access management. Each cloud provider offers different security models, tools, and terminology, making unified security difficult to achieve.