Bitprismia

Hacker reconnaissance work continues on TeleMessage app vulnerability — Report

2025-07-18 22:53:35

Main Idea

A vulnerability in the TeleMessage app is being actively exploited by hackers, with at least 11 IP addresses detected attempting the exploit, while the company claims the issue has been patched.

Key Points

1. GreyNoise detected 11 IP addresses attempting to exploit the CVE-2025-48927 vulnerability in TeleMessage, which allows data extraction from vulnerable systems.

2. A total of 2,009 IPs have searched for Spring Boot Actuator endpoints in the past 90 days, with 1,582 specifically targeting the _/health_ endpoints.

3. TeleMessage, similar to Signal but with chat archiving for compliance, was acquired by Smarsh in 2024 and has stated the vulnerability is patched.

4. The vulnerability is significant for government and enterprise users, including former US officials and agencies like Customs and Border Protection.

5. Chainalysis reports over $2.17 billion stolen in crypto-related thefts in 2025, with phishing attacks and credential theft on the rise.

Description

As of Wednesday, at least eleven IP addresses have actively tried to exploit the vulnerability, with thousands more addresses possibly doing reconnaissance work.

>> go to origin page
📱 Full Version
$IP
$4.576
-3.76%