See every side of every news story
Published loading...Updated

Hackers Scanning for TeleMessage Signal Clone Flaw Exposing Passwords

GLOBAL, JUL 17 – The vulnerability exposes sensitive data due to outdated configurations and has prompted CISA to mandate patching or discontinuation by July 22, with over 11 exploit attempts logged recently.

  • On Thursday, GreyNoise reported hackers targeting TeleMessage SGNL to access plaintext user data, as attempts continue since April and the app remains vulnerable.
  • GrayNoise researchers found instances still exposed as late as May 5, 2025, attributing this to outdated Spring Boot configurations, explaining the root cause of the flaw.
  • Over the past 90 days, more than 2,009 IPs probed Spring Boot Actuator endpoints, with 1,582 targeting /health; GreyNoise created a dedicated tracking tag for TeleMessage SGNL scans.
  • On July 1, U.S. Cybersecurity and Infrastructure Security Agency instructed agencies to patch or cease using the software, and CVE-2025-48927 was added to the KEV catalogue, forcing TeleMessage offline after attackers accessed backend infrastructure.
  • To defend against these attacks, experts recommend restricting the /heapdump endpoint, blocking IPs flagged by GreyNoise, and upgrading to supported Spring Boot versions.
Insights by Ground AI
Does this summary seem wrong?

11 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

technewstube.com broke the news in on Thursday, July 17, 2025.
Sources are mostly out of (0)