Home » Technology » Signal clone of the US government was hacked

Signal clone of the US government was hacked

A hacker has compromised the signal variant used by Donald Trump’s ex-security consultant Mike Waltz. A company offers modified versions of messengers who archive encrypted messages for authorities – with fatal gaps.

Security gap in the signal clone of the Trump team

The modified version of the Messenger app signal used by high-ranking US government members was hacked. An unknown attacker was able to enter the systems of Telemessage – the Israeli company that offers an archiving -capable variant of the actually safe messenger. The security gap concerns the app that the recently dismissed national security advisor Mike Waltz used at cabinet meetings with President Trump.

The incident shows which security risks can occur in communication at the highest level of government – and why you should not use apps “off the pole” for highly sensitive content. Telemessage markets its products as a solution for authorities and companies that have to archive encrypted messages for compliance reasons. The software retains the user interface of the original apps, but forwards copies of all messages to servers for archiving.

How 404 Media reports, the anonymous hacker claims that the slump into the backend infrastructure “took about 15 to 20 minutes” and required “no great effort” at all. Particularly alarming: The attacker was able to intercept unencrypted news content, including data from authorities such as the US COLL and border protection authority (CBP) and companies such as the CoinBase cryptocurrency exchange.

Basic security principles are levered out

Signal is actually known for its end-to-end encryption, which is supposed to withstand even state surveillance. However, the telemessage variant, which the company is currently renamed “Capture Mobile”, highlights this security principle by intercepting messages after decryption and storing it on its own servers. A signal spokesman already distanced himself from such unofficial versions: “We cannot guarantee the privacy or security properties of unofficial versions of Signal.”

According to 404 media, no direct news from Waltz or other cabinet members were intercepted, but the incident shows the fundamental vulnerability of the system. Waltz had only been released a few days ago after accidentally adding a journalist to a signal group weeks earlier, in which real-time updates were shared in Yemen. The unveiling that he used a modified signal version also exacerbates the safety concerns.