NSA Warns: iPhone, Android Messaging Settings Vulnerable

The National Security Agency (NSA) is urging iPhone and Android users to review their messaging app settings, citing vulnerabilities that could expose secure conversations to cyberattacks. The warning follows a recent incident where a journalist was inadvertently included in a Signal group chat involving sensitive national security discussions, highlighting concerns about the security of popular messaging apps like Signal and WhatsApp.
The vulnerability, according to the NSA and reports from Forbes, doesn't lie within the apps themselves, but rather in user settings related to linked devices and group links. The linked devices feature allows users to access their messages from multiple devices, creating a synced replica on each. A hacker gaining access to one of these linked devices could compromise the entire message history. Both WhatsApp and Signal allow users to view and remove linked devices from their account settings. The primary phone serves as the base device and can control linked devices.
Group links, available on Signal, enable users to invite others to a group chat via a shared link. Exploiting vulnerabilities in this feature allows hackers to link unauthorized devices to user accounts. While Signal users can disable this function, WhatsApp lacks a similar feature; however, administrators can control group member access.
The NSA recommends several security measures. These include regularly changing app PINs and enabling screen locks. Users should avoid sharing contact or status information and maintain separate phone and app contacts. The Cybersecurity and Infrastructure Security Agency (CISA) offers additional best practices for mobile communication security.
This warning follows other incidents. Google reported that Russian GRU officials used a phishing scheme involving a compromised Signal group link to gain access to conversations of Ukrainian leaders. The NSA emphasizes the importance of avoiding unexpected links or links from unknown senders to prevent similar phishing attacks. Signal itself acknowledged that while its encryption is robust, phishing remains a persistent threat for popular applications.
The recent incident involving the inclusion of an Atlantic journalist in a sensitive Signal group chat further underscores the importance of user vigilance. While Signal's end-to-end encryption protects message content from third-party access, improper use of settings like linked devices and group links can create vulnerabilities. Users are advised to regularly review and adjust these settings to minimize security risks.