Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

Posted on May 13, 2025May 13, 2025 By CWS

The cybersecurity company CISA is asking consideration to a vulnerability found in TeleMessage, a messaging software that was not too long ago utilized by Trump’s former nationwide safety advisor, Mike Waltz.

Waltz’s brief tenure as nationwide safety advisor was marked by two incidents associated to the usage of messaging functions. First, in what grew to become often known as ‘Signalgate’, he erroneously added a journalist to a Sign group chat the place nationwide safety leaders mentioned an upcoming army operation in Yemen. 

Waltz was later seen utilizing an software referred to as TeleMessage Sign on his cellphone, which once more raised safety issues.

The Signalgate incident reportedly performed a component in Trump’s determination to oust the nationwide safety adviser.

Israel-based TeleMessage, which is owned by Oregon-based communications firm Smarsh, permits customers to archive messages despatched by means of functions equivalent to WhatsApp, Telegram and Sign.  

After TeleMessage got here into the highlight on account of its use by Waltz, it was revealed that it has been used throughout the US authorities and it turned out that safety issues had been warranted.  

Hackers claimed to have stolen personal messages and group chats related to TeleMessage’s Sign, WhatsApp, WeChat and Telegram clones. The hackers didn’t get hold of the messages of US authorities officers, however demonstrated that the chat logs archived by TeleMessages weren’t encrypted and might be simply obtained by risk actors.

In response to the incident, Smarsh has briefly suspended all TeleMessage companies whereas it conducts an investigation.Commercial. Scroll to proceed studying.

Researcher Micah Lee has analyzed TeleMessage supply code and located that regardless of the seller’s claims that its Sign app, named TM SGNL, helps end-to-end encryption, in actuality the communication between the app and the ultimate message archive vacation spot will not be end-to-end encrypted, enabling an attacker to entry plaintext chat logs. 

Certainly, it appears hackers exploited this weak point to acquire consumer information from the TeleMessage archive server, together with personal Telegram messages belonging to cryptocurrency firm Coinbase and a listing of a whole bunch of Prospects and Border Safety staff.

This flaw now has a CVE identifier, CVE-2025-47729, which has been added to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog. 

The Nationwide Vulnerability Database entry for CVE-2025-47729 factors out that the safety subject has been exploited within the wild. 

Federal businesses are required to handle vulnerabilities included within the KEV record inside three weeks. Different organizations are additionally suggested to regulate the record for patch prioritization.

Within the case of the TeleMessage vulnerability, contemplating that it’s a server-side subject, there’s not a lot that customers can do past discontinuing the usage of the product, which is what CISA seems to be recommending.

Associated: Crucial Vulnerability in AI Builder Langflow Underneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Associated: CISA Urges Pressing Patching for Exploited CentreStack, Home windows Zero-Days

Security Week News Tags:Advisor, App, CISA, ExNational, Flaw, Security, TeleMessage, Warns

Post navigation

Previous Post: F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
Next Post: Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats

Related Posts

SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability Security Week News
GitGuardian Secures M to Enhance AI Identity Security GitGuardian Secures $50M to Enhance AI Identity Security Security Week News
Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Security Week News
ShinyHunters-Branded Extortion Activity Expands, Escalates ShinyHunters-Branded Extortion Activity Expands, Escalates Security Week News
Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News
Unauthenticated RCE Flaw Patched in DrayTek Routers Unauthenticated RCE Flaw Patched in DrayTek Routers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News