CISA Warning: Commercial Spyware Actively Targeting Messaging App Users

November 25, 2025

The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.

The Threat Landscape

CISA's alert reveals that threat actors are deploying multiple tactics to compromise messaging application users. These include phishing campaigns using malicious device-linking QR codes that compromise victim accounts and link them to attacker-controlled devices, zero-click exploits requiring no user interaction whatsoever, and impersonation of legitimate messaging platforms like Signal and WhatsApp.


The zero-click exploit capability is particularly concerning. These attacks succeed without any action from the device user—no clicking malicious links, no downloading suspicious files, no entering credentials. The exploitation occurs silently in the background, making detection extremely difficult for even security-conscious users.



Who's Being Targeted

Whilst current targeting remains opportunistic, evidence suggests these threat actors focus particularly on high-value individuals. Primary targets include current and former high-ranking government, military, and political officials, as well as civil society organisations and individuals across the United States, Middle East, and Europe.


The US House of Representatives has already taken action, banning WhatsApp on House devices following concerns about these threats. This decision reflects the seriousness with which government entities are treating the spyware risk to messaging applications.



The Commercial Spyware Problem

The alert specifically highlights commercial spyware—sophisticated surveillance tools developed by private companies and sold to governments and other actors. These tools represent a growing threat category that sits between nation-state capabilities and commodity malware.


Commercial spyware like NSO Group's Pegasus has been used in high-profile attacks against journalists, activists, and political figures globally. A landmark case saw a judge bar NSO from targeting WhatsApp users with spyware, though enforcement of such orders remains challenging when dealing with international actors.


Recent discoveries include LANDFALL, described as commercial-grade Android spyware in exploit chains targeting Samsung devices, and various campaigns impersonating messaging platforms to distribute malicious applications.



Attack Techniques Explained

Malicious QR Codes: Attackers create fraudulent QR codes that, when scanned, initiate device-linking processes connecting the victim's messaging account to attacker-controlled devices. This gives attackers real-time access to all messages, contacts, and media shared through the compromised account.


Zero-Click Exploits: These sophisticated attacks exploit vulnerabilities in messaging applications themselves, requiring no user interaction. WhatsApp has patched multiple zero-click vulnerabilities affecting iOS and macOS devices, but the discovery of such flaws demonstrates that messaging platforms remain vulnerable to advanced exploitation techniques.


Platform Impersonation: Threat actors create fake versions of legitimate messaging applications or phishing sites mimicking official download pages. ClayRat, a recently discovered Android spyware, has been distributed through campaigns impersonating Signal and ToTok messengers, using Telegram and phishing sites for distribution.




Regional Targeting Patterns

Evidence shows targeting across multiple regions. Russian-aligned threat actors have been observed actively targeting Signal Messenger users. In the UAE, researchers have uncovered spyware specifically targeting messaging app users in that region. European users have also been targeted through campaigns like ClayRat that use Telegram and phishing sites for distribution.


This geographical spread indicates that commercial spyware targeting messaging applications represents a global threat, not isolated to specific regions or political contexts.



CISA's Protective Guidance

CISA strongly encourages messaging app users to review updated Mobile Communications Best Practice Guidance and guidance on mitigating cyber threats with limited resources specifically designed for civil society organisations.


Key protective measures include:

Use Official Sources: Only download messaging applications from official app stores or verified sources. Never install applications from links in unsolicited messages or emails.

Be Cautious with QR Codes: Don't scan QR codes from untrusted sources, particularly those claiming to offer account linking, verification, or enhanced features for messaging applications.

Keep Software Updated: Install security updates promptly for both messaging applications and mobile operating systems. Many zero-click exploits target known vulnerabilities that patches have addressed.

Enable Security Features: Use all available security features including two-factor authentication, security notifications for new device logins, and encrypted backup options where available.

Verify Unusual Activity: Watch for signs of compromise including unexpected battery drain, unusual data usage, messages you didn't send, or contacts reporting suspicious messages from your account.

Limit Sensitive Communications: For truly sensitive discussions, particularly those involving government, military, or political matters, consider whether messaging applications represent appropriate communication channels.



The Broader Context

This alert arrives amid growing scrutiny of commercial spyware vendors and increased awareness of how sophisticated surveillance tools have proliferated beyond traditional intelligence agencies. The commoditisation of advanced exploitation techniques means that capabilities once limited to nation-states are now available to a much broader range of actors.


For organisations and individuals who are potential targets—government officials, political figures, activists, journalists, and civil society members—the threat environment has fundamentally changed. Messaging applications that seemed secure now face sophisticated attacks from well-resourced adversaries using commercial tools specifically designed to compromise them.



What This Means for Users

The uncomfortable reality is that messaging application security faces threats that many users cannot fully defend against individually. Zero-click exploits, by definition, succeed without user error. Even security-conscious individuals following best practices remain vulnerable to sophisticated commercial spyware.


This doesn't mean abandoning messaging applications entirely—they remain more secure than many alternatives for everyday communications. However, users must adjust their threat models and communication practices based on realistic assessment of risks.

High-value targets should assume their messaging applications may be compromised and adjust sensitive communications accordingly. Civil society organisations and individuals facing elevated risk should seek expert guidance on protective measures appropriate to their specific threat profiles.



For everyday users, maintaining updated software, using official application sources, and exercising caution with QR codes and suspicious messages remains essential. Whilst these measures won't prevent zero-click exploits, they protect against the more common social engineering attacks that represent the majority of successful compromises.

Ready to move from ideas to delivery?


Whether you’re planning a cloud change, security uplift, cost governance initiative or a digital delivery programme, we can help you shape the scope and the right route to market.


Email:
innovate@altiatech.com or call 0330 332 5842 (Mon–Fri, 9am–5:30pm).


Main contact page: https://www.altiatech.com/contact

A grid of dark gray squares, each with a person icon, featuring one bright blue square in the center.
By Simon Poole April 1, 2026
Explains how to configure break glass accounts in Microsoft Entra ID correctly, reducing risk and ensuring secure emergency access when standard controls fail.
A person holds a blue external hard drive connected by a cable to a laptop displaying a login screen.
By Simon Poole March 18, 2026
A practical guide to Microsoft Entra ID hardening and privileged access, with steps to reduce identity risk, strengthen controls, and improve security posture.
A hand clicks a computer mouse, connecting two digital bank icons with a glowing globe showing various currency symbols.
By Simon Poole March 13, 2026
Explores how open banking is scaling across the UAE and GCC and why strong API security and consent controls are essential for compliance, trust, and resilience.
Person holding a phone with a lock icon, using a laptop; digital security concept.
By Simon Poole March 11, 2026
A practical guide to reducing cyber risk exposure fast as geopolitical tensions rise, with clear steps to strengthen resilience, controls, and response.
A person points to an AI interface with glowing circuits, overlaid on a blue background.
By Simon Poole March 4, 2026
Explains how PPN 017 will shape AI procurement in the UK public sector and the questions buyers are likely to ask suppliers about governance, risk, and compliance.
Person using a calculator with a tablet on a wooden table.
By Wafik Rozeik February 25, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Digital, pixelated person with red data streams, facing forward. Cyberpunk, data glitch effect.
By Simon Poole February 24, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Person typing on laptop, cloud computing displayed on the screen, on a wooden table.
By Wafik Rozeik February 23, 2026
Explains why AI spend behaves differently and how anomaly management is becoming essential in FinOps to control costs, reduce risk, and improve cloud visibility.
Hand holding a phone displaying the Microsoft Copilot logo with the Microsoft logo blurred in the background.
By Simon Poole February 18, 2026
A practical governance checklist for Microsoft Copilot in 2026, using the Copilot Control System to manage risk, security, compliance, and oversight.
Route to market diagram: Bank to delivery platform, with steps like product mgmt and customer support.
By Simon Poole February 12, 2026
Explains what the Technology Services 4 (TS4) framework means for public sector buyers and how to procure Altiatech services through compliant routes.