Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

Posted on May 13, 2025May 13, 2025 By CWS

The cybersecurity company CISA is asking consideration to a vulnerability found in TeleMessage, a messaging software that was not too long ago utilized by Trump’s former nationwide safety advisor, Mike Waltz.

Waltz’s brief tenure as nationwide safety advisor was marked by two incidents associated to the usage of messaging functions. First, in what grew to become often known as ‘Signalgate’, he erroneously added a journalist to a Sign group chat the place nationwide safety leaders mentioned an upcoming army operation in Yemen. 

Waltz was later seen utilizing an software referred to as TeleMessage Sign on his cellphone, which once more raised safety issues.

The Signalgate incident reportedly performed a component in Trump’s determination to oust the nationwide safety adviser.

Israel-based TeleMessage, which is owned by Oregon-based communications firm Smarsh, permits customers to archive messages despatched by means of functions equivalent to WhatsApp, Telegram and Sign.  

After TeleMessage got here into the highlight on account of its use by Waltz, it was revealed that it has been used throughout the US authorities and it turned out that safety issues had been warranted.  

Hackers claimed to have stolen personal messages and group chats related to TeleMessage’s Sign, WhatsApp, WeChat and Telegram clones. The hackers didn’t get hold of the messages of US authorities officers, however demonstrated that the chat logs archived by TeleMessages weren’t encrypted and might be simply obtained by risk actors.

In response to the incident, Smarsh has briefly suspended all TeleMessage companies whereas it conducts an investigation.Commercial. Scroll to proceed studying.

Researcher Micah Lee has analyzed TeleMessage supply code and located that regardless of the seller’s claims that its Sign app, named TM SGNL, helps end-to-end encryption, in actuality the communication between the app and the ultimate message archive vacation spot will not be end-to-end encrypted, enabling an attacker to entry plaintext chat logs. 

Certainly, it appears hackers exploited this weak point to acquire consumer information from the TeleMessage archive server, together with personal Telegram messages belonging to cryptocurrency firm Coinbase and a listing of a whole bunch of Prospects and Border Safety staff.

This flaw now has a CVE identifier, CVE-2025-47729, which has been added to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog. 

The Nationwide Vulnerability Database entry for CVE-2025-47729 factors out that the safety subject has been exploited within the wild. 

Federal businesses are required to handle vulnerabilities included within the KEV record inside three weeks. Different organizations are additionally suggested to regulate the record for patch prioritization.

Within the case of the TeleMessage vulnerability, contemplating that it’s a server-side subject, there’s not a lot that customers can do past discontinuing the usage of the product, which is what CISA seems to be recommending.

Associated: Crucial Vulnerability in AI Builder Langflow Underneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Associated: CISA Urges Pressing Patching for Exploited CentreStack, Home windows Zero-Days

Security Week News Tags:Advisor, App, CISA, ExNational, Flaw, Security, TeleMessage, Warns

Post navigation

Previous Post: F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
Next Post: Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats

Related Posts

Google Discloses Data Breach via Salesforce Hack  Security Week News
Central Kentucky Radiology Data Breach Impacts 167,000 Security Week News
OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract Security Week News
Australia’s TPG Telecom Investigating iiNet Hack Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News
Booz Allen Invests in Machine Identity Firm Corsha Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News