Unofficial Signal app used by Trump officials investigates hack

TribeNews
By TribeNews 6 Views Add a Comment
3 Min Read

TeleMessage, an Israeli company that sells an unofficial Signal message archiving tool used by some U.S. government officials, has suspended all services after reportedly being hacked.

According to information on the company’s official website that has been partially removed, TeleMessage provides messaging archiving services for businesses and government entities, including tools to archive messages exchanged via messaging apps like Telegram, WhatsApp, WeChat, and Signal.

- Advertisement -

Smarsh, the parent company of TeleMessage, confirmed that all TeleMessage services have been suspended while it’s investigating what it described as “a potential security incident.”

“TeleMessage is investigating a potential security incident. Upon detection, we acted quickly to contain it and engaged an external cybersecurity firm to support our investigation,” a company spokesperson told BleepingComputer.

- Advertisement -

“Out of an abundance of caution, all TeleMessage services have been temporarily suspended. All other Smarsh products and services remain fully operational. We are committed to transparency and will share updates as we are able. We thank our customers and partners for their trust and patience during this time.”

The statement comes in response to a request to confirm a 404 Media report saying that a hacker breached TeleMessage and gained access to direct messages and group chats archived using TM SGNL, TeleMessage’s unofficial Signal clone, which former national security adviser Mike Waltz used for archiving Signal messages.

- Advertisement -

Screenshot of archived group message (404 Media)

​”I would say the whole process took about 15-20 minutes. It wasn’t much effort at all,” the hacker told 404 Media. “If I could have found this in less than 30 minutes then anybody else could too. And who knows how long it’s been vulnerable?”

Based on the hacker’s claims, messages of cabinet members and Waltz were not compromised; however, the extracted data allegedly includes government officials’ contact information, some message contents, and TeleMessage back-end login credentials.

- Advertisement -

While messages from Trump administration officials weren’t exposed in the breach, screenshots they shared link the stolen data to the U.S. Customs and Border Protection, crypto exchange Coinbase, and various financial services such as Scotiabank.

Former The Intercept journalist and software engineer Micah Lee also analyzed the source code of TeleMessage’s TM SGNL app and found several vulnerabilities, including hardcoded credentials.

“We cannot guarantee the privacy or security properties of unofficial versions of Signal,” a Signal spokesperson told Reuters earlier this week, while White House deputy press secretary Anna Kelly told NBC News that “Signal is an approved app for government use and is loaded on government phones.”

- Advertisement -

Why IT teams are ditching manual patch management
Manual patching is outdated. It’s slow, error-prone, and tough to scale.

Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.

Leave a Comment
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected & This Is Prohibited!!!

We have detected that you are using extensions to block ads and you are also not using our official app. Your Account Have been Flagged and reported, pending de-activation & All your earning will be wiped out. Please turn off the software to continue

You cannot copy content of this app