Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

Posted on May 13, 2025May 13, 2025 By CWS

The cybersecurity company CISA is asking consideration to a vulnerability found in TeleMessage, a messaging software that was not too long ago utilized by Trump’s former nationwide safety advisor, Mike Waltz.

Waltz’s brief tenure as nationwide safety advisor was marked by two incidents associated to the usage of messaging functions. First, in what grew to become often known as ‘Signalgate’, he erroneously added a journalist to a Sign group chat the place nationwide safety leaders mentioned an upcoming army operation in Yemen. 

Waltz was later seen utilizing an software referred to as TeleMessage Sign on his cellphone, which once more raised safety issues.

The Signalgate incident reportedly performed a component in Trump’s determination to oust the nationwide safety adviser.

Israel-based TeleMessage, which is owned by Oregon-based communications firm Smarsh, permits customers to archive messages despatched by means of functions equivalent to WhatsApp, Telegram and Sign.  

After TeleMessage got here into the highlight on account of its use by Waltz, it was revealed that it has been used throughout the US authorities and it turned out that safety issues had been warranted.  

Hackers claimed to have stolen personal messages and group chats related to TeleMessage’s Sign, WhatsApp, WeChat and Telegram clones. The hackers didn’t get hold of the messages of US authorities officers, however demonstrated that the chat logs archived by TeleMessages weren’t encrypted and might be simply obtained by risk actors.

In response to the incident, Smarsh has briefly suspended all TeleMessage companies whereas it conducts an investigation.Commercial. Scroll to proceed studying.

Researcher Micah Lee has analyzed TeleMessage supply code and located that regardless of the seller’s claims that its Sign app, named TM SGNL, helps end-to-end encryption, in actuality the communication between the app and the ultimate message archive vacation spot will not be end-to-end encrypted, enabling an attacker to entry plaintext chat logs. 

Certainly, it appears hackers exploited this weak point to acquire consumer information from the TeleMessage archive server, together with personal Telegram messages belonging to cryptocurrency firm Coinbase and a listing of a whole bunch of Prospects and Border Safety staff.

This flaw now has a CVE identifier, CVE-2025-47729, which has been added to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog. 

The Nationwide Vulnerability Database entry for CVE-2025-47729 factors out that the safety subject has been exploited within the wild. 

Federal businesses are required to handle vulnerabilities included within the KEV record inside three weeks. Different organizations are additionally suggested to regulate the record for patch prioritization.

Within the case of the TeleMessage vulnerability, contemplating that it’s a server-side subject, there’s not a lot that customers can do past discontinuing the usage of the product, which is what CISA seems to be recommending.

Associated: Crucial Vulnerability in AI Builder Langflow Underneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Associated: CISA Urges Pressing Patching for Exploited CentreStack, Home windows Zero-Days

Security Week News Tags:Advisor, App, CISA, ExNational, Flaw, Security, TeleMessage, Warns

Post navigation

Previous Post: F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
Next Post: Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats

Related Posts

The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Security Week News
40,000 Security Cameras Exposed to Remote Hacking Security Week News
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit Security Week News
Victoria’s Secret Website Taken Offline After Cyberattack Security Week News
Fortinet, Ivanti Patch High-Severity Vulnerabilities Security Week News
Mirai Botnets Exploiting Wazuh Security Platform Vulnerability  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News