Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It

Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It

Posted on July 18, 2025July 18, 2025 By CWS

A crucial safety vulnerability in TeleMessageTM SGNL, an enterprise messaging system modeled after Sign, has been actively exploited by cybercriminals looking for to extract delicate person credentials and private information. 

The flaw, designated CVE-2025-48927, impacts authorities businesses and enterprises utilizing this safe communication platform for archiving confidential messages.

Key Takeaways1. CVE-2025-48927 in Sign clone TeleMessageTM SGNL exposes passwords.2. 11 IPs exploiting the vulnerability, 2,000+ scanning for weak methods in 90 days.3. Disable /heapdump endpoint, block malicious IPs, improve Spring Boot instantly.

Overview of Spring Boot Actuator Flaw

The vulnerability stems from TeleMessageTM SGNL’s continued use of legacy Spring Boot Actuator configurations, the place a diagnostic /heapdump endpoint stays publicly accessible with out authentication. 

This endpoint can return full snapshots of heap reminiscence, roughly 150MB in dimension, doubtlessly containing plaintext usernames, passwords, and different delicate information.

Whereas newer variations of Spring Boot have addressed this safety concern by disabling public entry to such endpoints by default, TeleMessage cases continued utilizing the weak configuration by at the least Might 5, 2025. 

The severity of this challenge prompted the Cybersecurity and Infrastructure Safety Company (CISA) so as to add CVE-2025-48927 to its Identified Exploited Vulnerabilities (KEV) catalog on July 14th.

Lively Exploitation of CVE-2025-48927 

GreyNoise Analysis has recognized vital malicious exercise concentrating on this vulnerability. As of July 16, 11 IP addresses have been noticed trying to use CVE-2025-48927. 

The safety agency created a devoted monitoring tag on July 10 to watch these exploitation makes an attempt.

Extra regarding is the broader reconnaissance exercise previous these assaults. GreyNoise telemetry reveals that 2,009 IP addresses have scanned for Spring Boot Actuator endpoints throughout the previous 90 days. 

Of those, 1,582 IPs particularly focused /well being endpoints, generally utilized by attackers to determine internet-exposed Spring Boot deployments weak to exploitation.

The analysis staff has launched a devoted tag to trace scanning actions: “TeleMessageTM SGNL Spring Boot Actuator /heapdump Disclosure”. 

This systematic strategy to figuring out weak methods suggests organized cybercriminal campaigns fairly than opportunistic assaults.

Threat FactorsDetailsAffected ProductsTeleMessageTM SGNL (Sign clone enterprise messaging system)ImpactExposure of plaintext usernames, passwords, and delicate information by heap reminiscence dumps (~150MB snapshots)Exploit PrerequisitesPublicly accessible /heapdump endpoint with out authentication in legacy Spring Boot Actuator configurationsCVSS 3.1 Score5.3 (Medium)

Organizations using Spring Boot frameworks, significantly these working safe messaging environments, should instantly confirm whether or not their /heapdump endpoints are uncovered to the web. 

GreyNoise recommends blocking malicious IPs utilizing their menace intelligence feeds, particularly concentrating on SPRING BOOT ACTUATOR CRAWLER and SPRING BOOT ACTUATOR HEALTH SCANNER actions.

Crucial remediation steps embody disabling or proscribing entry to the /heapdump endpoint, limiting publicity of all Actuator endpoints except explicitly required, and upgrading to supported Spring Boot variations with safe defaults. 

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:App, Clone, Exploiting, Hackers, Leak, Passwords, Signal, TeleMessage, Vulnerability

Post navigation

Previous Post: Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet
Next Post: CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits

Related Posts

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely Cyber Security News
Iranian Hackers Target Omani Ministries: Data Theft Uncovered Iranian Hackers Target Omani Ministries: Data Theft Uncovered Cyber Security News
Active Exploitation of Windows Defender Zero-Day Flaws Active Exploitation of Windows Defender Zero-Day Flaws Cyber Security News
Cybercriminals Exploit Fake Avast Site for Credit Card Data Cybercriminals Exploit Fake Avast Site for Credit Card Data Cyber Security News
ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses Cyber Security News
Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark