How Telemessage on the Knockoff app on the signal has hacked in 20 minutes

Rate this post


They tried to enter Secure.telemessage.com Using a couple of these powers and found that they had just hacked a consumer with an email address related to US customs and border defense, one of the agencies applying the Trump Dragon Immigration Policy. CBP has since confirmed that he is a customer of telemesage.

After spending a few more minutes, digging through the landfill, the hacker also discovers a Laintext chat diaries. “I can read Coinbase internal chats, it’s amazing,” the hacker said. (Coinbase did not respond to Wired’s request for comment but did Say 404 media that “there is no evidence that sensitive information is available for Coinbase clients or that all customer accounts are at risk because Coinbase does not use this tool for sharing passwords, seed phrases or other data required to access accounts.”)

At this point, the hacker says they spent 15 to 20 minutes by stabbing Telemessage servers and has already compromised one of their federal government customers, along with one of the largest cryptocurrency exchanges in the world.

As I have discovered by Analysis TM SGNL source code, telemes applications – like the one that works on Mike Wals’ phone – loaded with non -cripped messages to archive.telemessage.com (I call this the archival server), which then refers messages to the client’s final destination. This contradicts the Telemessage public marketing material, where they claim that TM SNGL uses “end -to -end encryption to the corporate archive”.

The archival server is programmed in Java and is built using Spring Boot, an open source frame for creating Java applications. Spring Boot includes a set of features called Actuator, which help developers monitor and eliminate their errors in their applications. One of these characteristics is The end point of the landfillwhich is the URL that the hacker uses to download landfills.

According to Spring Boot Actuator documentation: “Since end points may contain sensitive information, you should consider when to expose them.” In the case of the Telemessage archive server, the pile dumps contain usernames, passwords, unforgettable chat diaries, encryption keys and other sensitive information.

If someone on the Internet has loaded the HEAP Dump Right URL as Mike Walks have sent text messages using the TM SGNL app, the Heap dump file would also contain its uniyped signal messages.

A 2024 Post The WIZ cloud security blog lists the “Heapdump File exposed” as a common wrong number one configuration in the spring drive. “Until version 1.5 (issued in 2017), the end point of /Heapdump was configured as publicly exposed and accessible without default certification. Since then, in later versions Spring Boot Actuator has changed its default interest to expose only the end points of health and /information without certificates “However, developers often deactivate these security measures for diagnostic purposes in the deployment of applications in test environments, and this seemingly small change in configuration may go unnoticed and thus be maintained when the application is ejected to production, inadvertently,”

In 2020 Post At Walmart’s Global Tech Blog, another developer gave a similar warning. “In addition to /health and /information, all endpoints of the drive mechanism are risky to open end users, as they can expose landfills, registration files, configuration and control data,” the author wrote. “The end points of the drive have consequences for security and should never be exposed in the production environment.”

The quick use of the hacker’s Telemessage shows that the archival server was poorly configured. He either performed an eight -year version of Spring Boot, or someone configured it manually to expose the end point at the public internet landfill.

Therefore, it took about 20 minutes before it was opened, spilling sensitive data.

Despite this critical vulnerability and other security issues with Telemessage products – the most of all, that the Israeli company that builds the products can access all the chatting diaries of its customers for Speeatextext – someone in the Trump administration has unleashed it on Mike Walz.

 
Report

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *