Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Blade Runner: 18-Rotor “Volocopter” Moving from Concept to Prototype
    • Inside a council under cyber-attack
    • 8 Unfiltered NSFW AI Chat Websites that feel too Real
    • Back office automation for insurance companies: A success story
    • General Motors and LG to produce new LMR battery cells for EVs
    • Cypriot videogame startup Studio 42 levels up with €3.2 million to fund their debut title
    • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
    • New pope chose his name based on AI’s threats to “human dignity”
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, May 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
    Technology

    How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes

    Editor Times FeaturedBy Editor Times FeaturedMay 18, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    They tried logging into safe.telemessage.com utilizing a pair of those credentials and found that that they had simply hacked a consumer with an e-mail deal with related to US Customs and Border Safety, one of many businesses implementing Trump’s draconian immigration coverage. CBP has since confirmed that it was a TeleMessage buyer.

    After spending a couple of extra minutes digging by means of the heap dump, the hacker additionally found plaintext chat logs. “I can learn Coinbase inner chats, that is unbelievable,” the hacker mentioned. (Coinbase didn’t reply to WIRED’s request for remark, however did tell 404 Media that “there isn’t any proof any delicate Coinbase buyer data was accessed or that any buyer accounts are in danger, since Coinbase doesn’t use this software to share passwords, seed phrases, or different knowledge wanted to entry accounts.”)

    At this level, the hacker says that they had spent 15 to twenty minutes poking at TeleMessage’s servers, and had already compromised one in all their federal authorities clients, together with one of many world’s largest cryptocurrency exchanges.

    As I found from analyzing TM SGNL’s supply code, TeleMessage apps—just like the one operating on Mike Waltz’s telephone—uploaded unencrypted messages to archive.telemessage.com (I name this the archive server), which then forwards the messages to the client’s last vacation spot. This contradicts TeleMessage’s public advertising and marketing materials, the place they claimed TM SNGL makes use of “end-to-end encryption from the cell phone by means of to the company archive.”

    The archive server is programmed in Java and is constructed utilizing Spring Boot, an open supply framework for creating Java purposes. Spring Boot features a set of options referred to as Actuator that helps builders monitor and debug their purposes. One among these options is the heap dump endpoint, which is the URL the hacker used to obtain heap dumps.

    In line with Spring Boot Actuator’s documentation: “Since Endpoints could comprise delicate data, cautious consideration ought to be given about when to show them.” Within the case of TeleMessage’s archive server, the heap dumps contained usernames, passwords, unencrypted chat logs, encryption keys, and different delicate data.

    If anybody on the web had loaded the heap dump URL proper as Mike Waltz was texting utilizing the TM SGNL app, the heap dump file would have contained his unencrypted Sign messages, too.

    A 2024 post on the cloud safety firm Wiz’s weblog lists “Uncovered HeapDump file” because the primary widespread misconfiguration in Spring Boot Actuator. “Up till model 1.5 (launched in 2017), the /heapdump endpoint was configured as publicly uncovered and accessible with out authentication by default. Since then, in later variations Spring Boot Actuator has modified its default configuration to show solely the /well being and /data endpoints with out authentication (these are much less fascinating for attackers),” the creator wrote. “Regardless of this enchancment, builders typically disable these safety measures for diagnostic functions when deploying purposes to check environments, and this seemingly small configuration change could stay unnoticed and thereby persist when an software is pushed to manufacturing, inadvertently permitting attackers to acquire unauthorized entry to vital knowledge.”

    In a 2020 post on Walmart’s World Tech Weblog, one other developer gave an analogous warning. “Other than /well being and /data, all actuator endpoints are dangerous to open to finish customers as a result of they will expose software dumps, logs, configuration knowledge and controls,” the creator wrote. “The actuator endpoints have safety implications and SHOULD NEVER EVER be uncovered in manufacturing surroundings.”

    The hacker’s fast exploit of TeleMessage signifies that the archive server was badly misconfigured. It was both operating an eight-year-old model of Spring Boot, or somebody had manually configured it to show the heap dump endpoint to the general public web.

    Because of this it took a hacker about 20 minutes of prodding earlier than it cracked open, with delicate knowledge spilling out.

    Regardless of this vital vulnerability and different safety points with TeleMessage’s merchandise—most notably, that the Israeli agency that builds the merchandise can entry all its buyer’s chat logs in plaintext—somebody within the Trump administration deployed it to Mike Waltz’s telephone whereas he was serving as nationwide safety adviser.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Are Meal Kits Cheaper than Groceries in 2025? We Break It Down

    May 18, 2025

    13 Best Soundbars We’ve Tested and Reviewed (2025): Sonos, Sony, Bose

    May 18, 2025

    21 Best High School Graduation Gifts (2025)

    May 18, 2025

    How to Choose a Router (2025): Tips, Technical Terms, and Advice

    May 18, 2025

    Polestar 4 2025 Review: Prices, Specs, Availability

    May 18, 2025

    The Middle East Has Entered the AI Group Chat

    May 15, 2025
    Leave A Reply Cancel Reply

    Editors Picks

    Blade Runner: 18-Rotor “Volocopter” Moving from Concept to Prototype

    May 19, 2025

    Inside a council under cyber-attack

    May 19, 2025

    8 Unfiltered NSFW AI Chat Websites that feel too Real

    May 19, 2025

    Back office automation for insurance companies: A success story

    May 19, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Are Video Games Becoming Too Smart?

    November 13, 2024

    Best Internet Providers in Yakima, Washington

    January 31, 2025

    Can AI help modernise Ireland’s healthcare system?

    April 20, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.