TeleMessage Hack: How the World of Secret Messaging Was Rocked
- Tharindu Ameresekere
- 14 hours ago
- 1 min read

Picture Credit: Pinterest
In a startling display of cybersecurity negligence, a hacker claims to have breached TeleMessage Signal (TM SGNL)—a clone of the encrypted messaging app Signal—used by at least one high-ranking Trump administration official, in just 15 to 20 minutes. The breach was due to a basic misconfiguration, shining a harsh spotlight on the risks of using unofficial or modified versions of secure platforms.
The incident gained attention after a photo surfaced of former National Security Adviser Mike Waltz checking TM SGNL under the table during a cabinet meeting. Unlike the original Signal, which is designed for end-to-end encrypted privacy, TM SGNL was created to archive messages, making it a potential goldmine for any would-be intruder.
Just days after the photo’s release, an anonymous hacker told 404 Media that gaining access to TeleMessage’s system was “not much effort at all.” While specifics of the exploit were initially withheld to prevent copycats, WIRED later confirmed that the app’s services had been temporarily suspended, clearing the way for the details to be safely shared.
The breach is a cautionary tale about how even minor lapses in cybersecurity—like a misconfigured server or weak access controls—can completely undermine the privacy safeguards that apps like Signal are meant to ensure. It also raises serious questions about the decision to use a monitored clone of a secure app for sensitive government communications.
Despite the gravity of the breach, TeleMessage and its parent company, Smarsh, have not publicly commented on the hack. For users and institutions concerned with digital security, the message is clear: security features mean nothing without airtight implementation.