The directive was blunt. European Commission department chiefs and their deputies were told to shut down a Signal group chat they had been using to exchange information. The order followed a series of coordinated phishing attacks targeting the EU's internal communications — attacks in which senior officials and members of Commissioners' cabinets received messages impersonating Signal support staff, asking them to enter their PIN codes. The technique is not sophisticated. It does not need to be. It works.
The Commission had previously recommended Signal over WhatsApp for staff communications, citing its stronger privacy protections. That recommendation has now collided with an operational reality that the cybersecurity community has been warning about for years: the strength of an app's encryption protocol is not the same thing as the security of the communications it carries. The encryption can be flawless. The humans holding the devices are not.
The Phishing Campaign That Forced the Decision
The attacks against EU officials are part of a broader campaign that intelligence agencies across Europe have attributed to Russian state-linked actors. In March 2026, the Dutch intelligence service AIVD and its Portuguese counterpart issued public warnings that Kremlin-backed operators were systematically targeting Signal and WhatsApp accounts of government officials, diplomats, military personnel, and journalists across Europe.
The method is consistent across targets. A message arrives from a profile named "Signal Support" or a similar official-sounding identity. It claims the account is at risk. It asks the user to enter a verification code and PIN — credentials that, once provided, allow the attacker to link a new device to the account or take it over entirely. A related technique involves social engineering targets into scanning a QR code that silently adds an attacker-controlled device to the victim's Signal account.
Germany's former deputy director of the BND — the country's foreign intelligence service — was among the confirmed victims. The campaign has compromised thousands of accounts worldwide. The attackers are not breaking Signal's end-to-end encryption. They do not need to. They are walking through the front door by convincing the person holding the key to hand it over.
"The encryption was never the vulnerability. The vulnerability is that a consumer app designed for individual users became the de facto secure communications channel for institutions it was never built to serve."
From Signalgate to Brussels: A Pattern Emerges
The EU shutdown cannot be understood in isolation. It is the second major institutional failure of consumer encrypted messaging in twelve months.
In March 2025, National Security Advisor Mike Waltz accidentally added Jeffrey Goldberg, the editor-in-chief of The Atlantic, to a Signal group chat in which Vice President JD Vance, three cabinet secretaries, and the directors of two intelligence agencies were discussing imminent military strikes against the Houthis in Yemen. Secretary of Defense Pete Hegseth used the chat to share classified operational details — aircraft types, missile platforms, launch windows, and attack times. The full transcript was subsequently published.
The scandal, which the media named Signalgate, was treated primarily as a story about human error. An accidental addition to a group chat. A breakdown of classification discipline. These are accurate descriptions of what happened. They are incomplete descriptions of why it happened.
It happened because the most senior national security officials in the United States were conducting operational military planning on a consumer messaging application. They were doing so because the official secure communications infrastructure available to them — classified networks, SCIFs, secure terminals — is cumbersome, slow, and poorly suited to the tempo of real-time coordination. Signal was easier. So Signal is what they used.
The EU officials using Signal for institutional coordination made the same calculation. The official channels were too slow, too rigid, too inconvenient. Signal was fast, encrypted, and already on their phones. The convenience was real. The security model was not designed for what they were doing with it.
Why Consumer Encryption Is Not Institutional Security
Signal's encryption protocol is genuinely excellent. The Double Ratchet protocol provides forward secrecy and post-compromise security that represent the state of the art in consumer cryptography. None of this is in dispute. The problem is not the protocol. The problem is everything around it.
A consumer messaging app has no concept of institutional identity. There is no way to verify that the person in a group chat is who they claim to be beyond trusting a phone number. There is no administrative control over who can be added to a group, who can be removed, or what happens to messages after they are received. There is no audit trail. There is no compliance framework. There is no key management policy beyond what the app decides on behalf of its billion users collectively.
When the European Commission concentrates sensitive institutional communications in a Signal group chat, it creates what its own security review correctly identified as a single point of failure. One compromised device — through phishing, through malware, through a lost phone — exposes the entire conversation history, every document shared, every participant identified. The institution has no ability to detect the compromise, no ability to revoke access, no ability to remotely wipe the data. It has ceded its institutional communications security to a consumer application whose threat model was designed for activists and journalists, not for the operational communications of a supranational government.
The Vacuum That Consumer Apps Fill
The uncomfortable truth behind both Signalgate and the EU shutdown is that senior officials are not using Signal because they are reckless. They are using it because the institutional alternatives are inadequate for the way modern organizations actually operate.
Classified networks are air-gapped, which means they are inaccessible from the devices officials carry throughout their day. Secure terminals are physically located in specific rooms. The official communications infrastructure was built for an era when sensitive discussions happened in scheduled meetings and formal memoranda — not in real-time coordination across time zones on mobile devices.
Signal filled the gap. So did WhatsApp, and Telegram, and iMessage, and every other consumer platform that offered encryption and convenience in a single package. Officials adopted these tools not in spite of security guidance but because no institutional tool offered them what they actually needed: secure, real-time, mobile communications with the people they work with.
This is the vacuum. And consumer apps, no matter how good their encryption, cannot fill it safely. They were not designed for institutional use. They have no institutional controls. They create institutional exposure every time they are used for institutional purposes.
"Officials did not abandon secure channels because they stopped caring about security. They abandoned them because those channels could not keep pace with the operational tempo of modern governance."
What Actually Needs to Exist
The EU's response — shut down the Signal group — addresses the symptom. The officials who were using that group chat still need to communicate in real time. If they cannot use Signal, they will use something else. If the something else is another consumer app, the same vulnerabilities apply. If the something else is the existing institutional infrastructure, the same usability problems that drove them to Signal in the first place will drive them elsewhere again.
What is needed is communications infrastructure that was built from the beginning for institutional use by organizations whose communications carry genuine consequence. Infrastructure where identity is verified at the institutional level, not the phone number level. Where access controls, audit capabilities, and key management are features of the architecture, not afterthoughts. Where the encryption is not merely end-to-end but quantum-resistant — because the communications being protected today will still be sensitive when quantum decryption capability arrives. Where the infrastructure operates in a jurisdiction and under a legal framework that the institution chose deliberately.
This infrastructure needs to be as fast, as mobile, and as intuitive as the consumer apps it replaces. That is not a nice-to-have requirement. It is the requirement that determines whether officials will actually use it. The lesson of both Signalgate and the EU shutdown is not that officials are irresponsible. It is that the security community has failed to provide them with tools that are both secure enough and usable enough for the way they actually work.
The European Commission shut down its Signal group chats because consumer encrypted messaging is not institutional communications infrastructure. That conclusion is correct. The question now is what those officials — and their counterparts in every allied government — are going to use instead. The answer to that question will define the communications security posture of Western institutions for the next decade.
If your organization is reconsidering its reliance on consumer messaging for sensitive communications, we'd like to hear from you.
Get in Touch