The statement comes in response to a request to confirm a 404 Media report saying that a hacker breached TeleMessage and gained access to direct messages and group chats archived using TM SGNL, TeleMessage's unofficial Signal clone, which former national security adviser Mike Waltz used for archiving Signal messages. Based on the hacker's claims, messages of cabinet members and Waltz were not compromised; however, the extracted data allegedly includes government officials' contact information, some message contents, and TeleMessage back-end login credentials. TeleMessage, an Israeli company that sells an unofficial Signal message archiving tool used by some U.S. government officials, has suspended all services after reportedly being hacked. TeleMessage provides secure mobile messaging services for businesses, including tools to archive messages exchanged via secure end-to-end encrypted messaging apps like Telegram, WhatsApp, and Signal. While messages from Trump administration officials weren't exposed in the breach, screenshots they shared link the stolen data to the U.S. Customs and Border Protection, crypto exchange Coinbase, and various financial services such as Scotiabank. Former The Intercept journalist and software engineer Micah Lee also analyzed the source code of TeleMessage's TM SGNL backdoored Signal app and found several vulnerabilities, including hardcoded credentials.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Mon, 05 May 2025 19:15:05 +0000