CISA recommends Signal and FIDO authentication after attacks on U.S. telecoms

CISA recommends Signal and FIDO CISA issues guidance following recent attacks on U.S. telecom providers

The Cybersecurity and Infrastructure Security Agency (CISA) has called on senior officials and public figures to transition to secure, encrypted messaging applications like Signal. This recommendation comes in response to widespread telecommunication breaches across multiple countries, including significant incidents in the United States.

What Prompted CISA’s Recommendation?

In late October, CISA and the FBI confirmed that a series of cyberattacks, attributed to the China-backed threat group “Salt Typhoon,” targeted U.S. telecom providers such as T-Mobile, AT&T, Verizon, and Lumen Technologies. These breaches allowed attackers to access sensitive data for months, exposing critical vulnerabilities in existing systems.

Although the guidance specifically targets individuals with access to sensitive government information, the measures proposed by CISA are practical for anyone seeking to protect their personal data and communications.

Why is Encrypted Messaging Crucial?

CISA warns that mobile device communications are vulnerable to interception or manipulation, especially for individuals in high-risk positions. To counter these threats, CISA highlights Signal as a secure alternative for encrypted communication across mobile and desktop platforms, including iOS, Android, macOS, Windows, and Linux.

What Authentication Measures Did CISA Recommend?

CISA underscores the importance of phishing-resistant multi-factor authentication (MFA), particularly using FIDO-compliant hardware security keys, such as Yubico or Google Titan. These keys enhance account security for platforms like Microsoft, Apple, and Google.

For additional security, CISA suggests enabling advanced protection features like:

  • Google’s Advanced Protection Program (APP)
  • Apple’s Lockdown Mode

These options safeguard accounts from phishing attacks and unauthorized access.

What Else Did CISA Advise?

  1. Avoid SMS-Based MFA
    SMS-based MFA is susceptible to attacks like SIM swapping. Instead, use a hardware-based or app-based MFA solution.
  2. Adopt Password Managers
    Password managers generate and securely store complex passwords, reducing the risks associated with password reuse and weak credentials.
  3. Set PINs or Telecom Passwords
    Protect sensitive telecom operations, such as number porting, with PINs or dedicated passwords to prevent SIM-swapping attacks.
  4. Regularly Update Software
    Keeping devices and software up-to-date helps address newly discovered vulnerabilities.
  5. Upgrade Hardware
    Transition to the latest available hardware to benefit from modern security features unavailable on older devices.
  6. Avoid Commercial VPNs
    Many commercial VPNs lack robust security and privacy policies, potentially expanding attack surfaces rather than reducing them.

Why Does This Matter for Organizations?

While the guidance primarily targets public officials, it’s also applicable to organizations aiming to protect sensitive data and mitigate risks from advanced persistent threats (APTs). Adopting robust security measures such as passwordless authentication with FIDO passkeys can significantly reduce vulnerability to breaches.


Simplify passwordless security with FIDO and passkeys

Contact us for seamless implementation

How Can Secfense Help?

Secfense specializes in delivering passwordless authentication using FIDO standards and passkeys. Without requiring changes to your existing infrastructure, Secfense simplifies the integration of phishing-resistant MFA and ensures compliance with frameworks like DORA, NIS2 GDPR or CCPA.

Get in Touch

Learn how Secfense can enhance your organization’s cybersecurity. Contact a Secfense expert.

Learn More

Watch our webinar on modern passwordless solutions to explore how FIDO and passkeys are revolutionizing security.

Antoni takes care of all the marketing content that comes from Secfense. Read More

Testimonials

We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk

CEO

Sandis

We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director

RKKVC

Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera

Partner

Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT

MPEC S.A.