home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,484 of 2,445   
   Mike Powell to All   
   US Gov Signal clone hit i   
   03 Jul 25 15:26:00   
   
   TZUTC: -0500   
   MSGID: 1218.consprcy@1:2320/105 2ccc2384   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Signal clone used by federal agencies hit in attacks targeting major flaws -   
   CISA says patch immediately   
      
   Date:   
   Thu, 03 Jul 2025 13:57:00 +0000   
      
   Description:   
   CISA has warned a federal messaging app is being targeted by hackers, so    
   patch now.   
      
   FULL STORY   
      
   The US Cybersecurity and Infrastructure Security Agency (CISA) has warned a   
   popular Signal messaging app clone being used by federal agencies is under   
   attack.    
      
   The clone, TeleMessage, was found to have some serious issues, including a   
   lack of proper end-to-end encryption.    
      
   Hackers have been exploiting two flaws, CVE-2025-48927 and CVE-2025-48928, to   
   access federal chat logs and metadata. CISA has given federal agencies until   
   July 22 to apply patches.   
      
   Federal chat app hacked    
      
   The new comes months after then-US national security advisor Mike Waltz   
   accidentally added Jeffrey Goldberg, editor in chief at The Atlantic , to a   
   secret Signal chat discussing ongoing US strikes against Houthi rebels in   
   Yemen. Waltz was then removed from his position as a result.    
      
   Following investigations into the fiasco, it emerged that Waltz and others   
   werent using Signal, but a clone of the app called TM SGNL, which was   
   developed by TeleMessage.    
      
   The app was then subsequently targeted in an attack that saw the chat logs    
   and metadata of around 60 government officials including Secret Service   
   members and a White House official leaked online .    
      
   The first flaw listed by CISA, CVE-2025-48927, has a CVSS score of 5.3, and   
   allows hackers to extract sensitive data from memory dumps exposed by a    
   Spring Boot Actuator misconfiguration in the TeleMessage app that exposes the   
   /heapdump endpoint.    
      
   The second flaw, CVE-2025-48928, has a CVSS score of 4.0, and allows an   
   attacker to access exposed passwords sent over HTTP by stealing a memory-dump   
   file through local access to the TeleMessage server.    
      
   No other details on the flaws have been released by CISA, but the agency has   
   said that federal agencies must patch the app by July 22 or stop using it   
   altogether.    
      
   Via The Register   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/signal-clone-used-by-federal-agencies-h   
   it-in-attacks-targeting-major-flaws-cisa-says-patch-immediately   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca