<span class=caption-credit> The Washington Post via Getty Images</span>
TeleMessage Security Breach 2025: Trump Administration’s Signal Clone App Hacked
Table of Contents
Security Breach Details
In a significant cybersecurity incident, TeleMessage, an Israeli company providing modified versions of encrypted messaging apps like Signal and Telegram, has been compromised. The breach was first reported by 404 Media, revealing that a hacker successfully exploited a vulnerability in the service, gaining access to sensitive data and archived communications.
Key Breach Information
- Attack Duration: 15-20 minutes
- Effort Level: Minimal (according to hacker)
- Access Gained: Archived chats and contact information
- Security Status: Not end-to-end encrypted
Scope of Impact
The breach has exposed vulnerabilities in the communication system used by high-ranking government officials and major corporations. The hacker gained access to archived chats, contact information of government officials, TeleMessage login credentials, and sensitive data related to the US Customs and Border Protection agency.
Affected Organizations
- US Government Agencies
- US Customs and Border Protection
- Coinbase
- Scotiabank
- Other corporate clients
Affected Government Officials
The breach has revealed the presence of several high-profile government officials in archived chats, though former National Security Adviser Mike Waltz’s conversations appear to be uncompromised. Other prominent figures whose data was potentially exposed include Vice President JD Vance, Marco Rubio, and Tulsi Gabbard.
Recent Timeline
- Last Week: Mike Waltz accidentally reveals TeleMessage usage
- Today: Breach discovered and reported
- Current Status: Service temporarily suspended
- Investigation: Ongoing by TeleMessage
Security Implications
This breach comes in the wake of the recent Signalgate controversy, where top US officials were found using Signal for discussing active combat operations. The incident highlights a concerning trend of government officials using consumer-grade messaging apps instead of traditional secure communication channels like Sensitive Compartmented Information Facilities (SCIFs).
Security Concerns
- Lack of end-to-end encryption
- Vulnerable message archiving
- Exposed contact information
- Compromised login credentials
Latest Developments
TeleMessage’s parent company Smarsh has yet to comment on the breach. However, TeleMessage has issued a statement to Reuters confirming they are “investigating a potential security incident” and have suspended their services “out of an abundance of caution.” This development raises serious questions about the security protocols in place for government communications and the risks associated with using modified versions of consumer messaging apps.
Current Status Update
As of May 5, 2025, 3:38 PM ET: TeleMessage has officially confirmed they are investigating the security incident and have temporarily suspended all services while the investigation is ongoing.