Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide

Security

NCSC warns of messaging app targeting

Alongside international partners, the National Cyber Security Centre (NCSC) has issued actions for individuals at risk of attacks against messaging apps, as a result of growing malicious activity from Russia-based actors using messaging apps - such as WhatsApp, Messenger and Signal - to target high-risk individuals.

Above: The National Cyber Security Centre (NCSC), Nova South, London.
Image by Simona Flamigni / copyright Shutterstock

High-risk individuals face a greater likelihood of attacks against their accounts due to a combination of their role and potential access to sensitive information and important people. You might be a high-risk individual if your work or public status means you have access to, or influence over, sensitive information that could be of interest to threat actors.

Advertisement
ODU RT

The NCSC has previously reported on the targeting of government officials’ accounts by China state-affiliated APT31, Russian Federal Security Service (FSB) actor Star Blizzard and Iran's Islamic Revolutionary Guard Corps (IRGC).

Attackers may attempt to:

  • Trick you into sharing login or account recovery codes.
  • Add their own device to your account without you noticing.  
  • Join group chats without detection.
  • Impersonate someone you know.
  • Phish you using malicious links or QR codes. 

What should I do?
While anyone can be the victim of social engineering there are key actions you can take to reduce the risks against your personal accounts:

Advertisement
ODU RT
  • Do not share sensitive information via messaging apps.
  • For work communications, use corporately provided messaging services and devices where available and abide by your organisation’s policies.
  • Do not share verification codes or scan unexpected QR codes.
  • Enable two-step verification (for Signal users this is called Registration Lock in Settings).
  • Enable passkeys where available (both WhatsApp and Signal support passkeys).
  • Regularly check for linked devices in settings, review group members and remove or verify any participants you do not recognise independently.  
  • Beware of impersonations, unknown contacts and contacts appearing more than once.
  • On personal accounts use disappearing messages that automatically delete after a set period – by turning this on you will limit what a successful attacker could access if they do manage to get in. However, you should have regard to any applicable record keeping requirements.
  • The NCSC’s guidance for high-risk individuals on protecting accounts and devices supports all these recommended actions and includes information on accessing Individual Cyber Defence services to further improve your personal cyber resilience.
  • The following NCSC advice should be considered:
       - Device Security guidance - choosing an enterprise instant messaging solution
       - Secure communications principles

Further advice and resources
Those working in government should follow government guidance on the use of non-corporate communications channels.  

Advertisement
FIA2026 animated banner
MGI conducts first TigerShark flights with Auterion

Aerospace Defence Security

MGI conducts first TigerShark flights with Auterion

2 April 2026

MGI Engineering Ltd (MGI) has announced the successful first flights of its TigerShark uncrewed deep strike platform, in partnership with Auterion.

Logiq acquires Savient

Security

Logiq acquires Savient

1 April 2026

Logiq has acquired Savient Ltd, a technology and data specialist focused on delivery in highly regulated environments, strengthening its capability and further expanding its presence in the South-West.

SIA introduces changes for close protection operatives

Security

SIA introduces changes for close protection operatives

1 April 2026

Today, the Security Industry Authority (SIA) have introduced changes to training for those holding, or applying for, a close protection licence.

LexisNexis Risk Solutions releases Cybercrime Report

Security

LexisNexis Risk Solutions releases Cybercrime Report

31 March 2026

LexisNexis Risk Solutions has released its latest Cybercrime Report which reveals rapid growth in synthetic identity fraud, bot-driven attacks and account takeover activity across global markets, whilst first-party fraud remains the most reported fraud type.

Advertisement
ODU RT
Getac launches CommandCore

Defence Security

Getac launches CommandCore

27 March 2026

Getac has announced the launch of its CommandCore rugged drone control solution.

DE&S awards five providers nine contracts to support 3,000 military and police boats

Defence Security

DE&S awards five providers nine contracts to support 3,000 military and police boats

27 March 2026

Defence Equipment & Support (DE&S), part of the Ministry of Defence’s (MoD) National Armaments Director Group, has awarded £283.5 million worth of contracts to maintain and support approximately 3,000 boats across the UK Armed Forces and MoD Police, creating and safeguarding over 100 skilled jobs across England, Scotland and Wales.

Advertisement
ODU RT
Advertisement
Gulfstream banner