Customs and Border Protection Acknowledges Utilizing Hacked Signal Clone TeleMessage

TeleMessage’s Security Breach Raises Alarms in U.S. Government Communications

The United States Customs and Border Protection (CBP) agency has confirmed its use of at least one communication application developed by TeleMessage, a company known for creating clones of popular messaging platforms like Signal and WhatsApp. These clones feature added archival mechanisms aimed at helping organizations comply with records-retention regulations. However, recent developments have cast shadows on the app’s reliability and security.

Following the identification of a cybersecurity incident, a CBP spokesperson stated that the agency promptly disabled the TeleMessage service as a precaution. An investigation is currently underway to determine the extent of the breach, signifying a proactive approach to mitigate risks after uncovering potential vulnerabilities.

Last week, a widely circulated photograph showed Mike Waltz, former national security adviser to President Donald Trump, using TeleMessage Signal during a cabinet meeting. The image suggested he was in communication with high-level officials, including Vice President JD Vance and others from the executive branch. This incident brought renewed scrutiny to the application’s security.

In the wake of this revelation, TeleMessage has reportedly been the target of multiple breaches, leading to concerns over significant security flaws in its infrastructure. An analysis of the app’s Android source code has suggested fundamental weaknesses in its security protocols. As TeleMessage, which was acquired last year by U.S.-based Smarsh, faces scrutiny, the company has temporarily suspended its services to facilitate a thorough investigation.

A spokesperson for Smarsh confirmed the security incident and highlighted that they had engaged an external cybersecurity firm to assist with the investigation. All other Smarsh products remain operational, demonstrating that the company is taking steps to isolate the issue while continuing its broader service offerings.

The recent breaches prompted U.S. Senator Ron Wyden to call for a Department of Justice investigation into TeleMessage, labeling the service a possible threat to national security. While TeleMessage serves as a federal contractor, its consumer applications have not received approval from the U.S. government’s Federal Risk and Authorization Management Program, raising further concerns over their safety and compliance. Wyden’s letter underscored that “several federal agencies” utilize TeleMessage and raised alarm over its potentially insecure software being in use at critical levels of government.

At this point, there remains a lack of comprehensive public accounting regarding which U.S. government officials and agencies have utilized the software. The incident emphasizes the need for robust cybersecurity measures and due diligence when it comes to communication tools used by government entities.

In assessing the methods potentially used in this attack, tactics identified in the MITRE ATT&CK Matrix, such as initial access and privilege escalation, could be at play. It is crucial for organizations to recognize that vulnerabilities in software, especially those used for sensitive communications, can lead to significant operational risks, underscoring the importance of continually monitoring and securing technological assets.

As this situation develops, businesses and government stakeholders alike are reminded of the importance of safeguarding sensitive communications and the potential implications of utilizing software lacking rigorous security standards.

Source