Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Great TeleMessage Hack: How a Simple Misconfiguration Exposed US Government and Corporate Data to Cybersecurity Threats


Security Researchers Sound Alarm as TeleMessage Signal Clone App Exposes Federal Government Customers to Hacking Risks

  • The TeleMessage Signal clone app was found to have a glaring vulnerability, exposing sensitive data belonging to US government agencies and major corporations.
  • A simple misconfiguration on the part of the company's developers exposed the heap dump endpoint to the public internet, allowing hackers to access sensitive information.
  • The breach was made possible by outdated software (Spring Boot) and a weak password hashing mechanism, which negated security benefits.
  • Developers can learn from this incident and prioritize cybersecurity measures to prevent similar breaches in the future.



  • The world of cybersecurity is fraught with peril, where the most seemingly innocuous missteps can have catastrophic consequences. A recent investigation by researchers has uncovered a glaring vulnerability in the TeleMessage Signal clone app, which was used by at least one Trump administration official, exposing sensitive data belonging to US government agencies and major corporations.

    At the heart of this security breach lies a simple yet egregious misconfiguration on the part of TeleMessage's developers. The company's archive server, built using Spring Boot, an open source framework for creating Java applications, was poorly configured to expose the heap dump endpoint to the public internet. This exposed sensitive information, including usernames, passwords, unencrypted chat logs, encryption keys, and other critical data.

    According to sources, the hacker who breached TeleMessage's systems used a tool called feroxbuster to quickly identify publicly available resources on the company's website. They then exploited a weak password hashing mechanism, which negated the security benefits of hashing passwords. The hacker also discovered that the archive server was built using an outdated version of Spring Boot and had not been updated in over eight years.

    This lack of updates created an opportunity for an attacker to exploit a known vulnerability in the system, specifically the heap dump endpoint. This endpoint is designed to provide information about the system's memory usage but can also contain sensitive data if it is not properly secured.

    The hacker reported that they were able to breach TeleMessage's systems within 15-20 minutes of identifying the vulnerable URL on the company's website. They then used this access to download a heap dump file, which contained the sensitive information mentioned earlier. This hack was further complicated by the fact that the hacker could see unencrypted Signal messages belonging to Mike Waltz, who was using the TeleMessage app at the time.

    The breach of TeleMessage's systems has significant implications for national security and corporate data protection. It highlights the importance of keeping software up to date and properly configuring security measures to prevent such breaches.

    In a statement, TeleMessage acknowledged that they had experienced a security incident and were investigating further. They also suspended all services on their platform until the issue could be resolved.

    The investigation into this breach has raised concerns about the use of insecure tools and practices in the development of software applications. It serves as a reminder to developers and organizations alike of the importance of following best practices for cybersecurity and data protection.

    In conclusion, the great TeleMessage hack serves as a stark warning to all who would engage in cyber threats against US government agencies and major corporations. The security breach was caused by a simple yet egregious misconfiguration on the part of the company's developers. It highlights the need for vigilance and attention to detail when it comes to cybersecurity and data protection.

    The full extent of the damage caused by this hack is still being assessed, but one thing is clear: the TeleMessage Signal clone app was woefully unprepared for the threat that it posed. This incident serves as a stark reminder of the importance of prioritizing cybersecurity in all aspects of our lives.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Great-TeleMessage-Hack-How-a-Simple-Misconfiguration-Exposed-US-Government-and-Corporate-Data-to-Cybersecurity-Threats-ehn.shtml

  • https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/

  • https://www.theregister.com/2025/05/05/telemessage_investigating/

  • https://www.nextgov.com/cybersecurity/2025/05/signal-clone-used-waltz-archive-messages-suspends-services-after-reported-hack/405078/


  • Published: Sun May 18 06:24:36 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us