On the 4th of Might 2025, TeleMessage, an Israeli firm offering modified variations of encrypted messaging apps like Sign, suffered a significant knowledge breach. The breach uncovered archived messages, contact data of presidency officers, and backend login credentials.
The hacker, whose identification remains to be unknown, exploited a vulnerability within the firm’s system, accessing a publicly uncovered Java heap dump file that contained delicate data. This incident raised severe considerations in regards to the safety of communications on the highest ranges of the USA authorities, particularly since former Nationwide Safety Advisor Mike Waltz was seen utilizing TeleMessage’s TM SGNL app throughout a cupboard assembly.
Following the breach, TeleMessage briefly suspended its providers and eliminated references to the app from its web site. The corporate’s mum or dad group, Smarsh, is reportedly rebranding the service as Seize Cellular.
The incident has prompted investigations into the safety practices of TeleMessage and the potential dangers related to utilizing modified messaging apps for official authorities communications.
CISA Added TeleMessage Vulnerability to KEV Listing
In response, on 13 Might 2025, the Cybersecurity and Infrastructure Safety Company (CISA) added the crucial vulnerability in TeleMessage’s TM SGNL messaging app to its Recognized Exploited Vulnerabilities (KEV) catalogue.
This vulnerability, recognized as CVE-2025-47729, entails the storage of unencrypted message archives, permitting attackers to entry plaintext chat logs. Regardless of a low CVSS rating of 1.9, the flaw’s exploitation within the wild prompted CISA to mandate that federal companies tackle the problem inside three weeks, both by making use of vendor-provided mitigations or discontinuing the usage of the product.
DDoSecrets Indexes TeleMessage Breach Knowledge
Now, Distributed Denial of Secrets and techniques (DDoSecrets), a nonprofit centered on sharing leaked and hacked knowledge within the public curiosity, has added the total set of breached TeleMessage knowledge to its on-line archive.
In a put up on Telegram, the organisation mentioned the info consists of some plaintext messages, whereas different components consist solely of metadata like sender and recipient data, timestamps, and group names. To make the fabric simpler to research, DDoSecrets additionally extracted readable textual content from the unique heap dump recordsdata.
Nevertheless, as a result of the dataset comprises private data and consists of messages unrelated to authorities or company exercise, entry is at present restricted to journalists and researchers.
As of now, Hackread.com has not obtained a response to its request for entry to the info. However, the indexing of the TeleMessage knowledge provides to the corporate’s troubles. Weeks after the breach, its web site nonetheless reveals restricted content material, and operations are nonetheless suspended.