logo
#

Latest news with #ROME-VATICAN

Hacker who breached communications app used by Trump aide stole data from across US government
Hacker who breached communications app used by Trump aide stole data from across US government

Indian Express

time22-05-2025

  • Politics
  • Indian Express

Hacker who breached communications app used by Trump aide stole data from across US government

A hacker who breached the communications service used by former Trump national security adviser Mike Waltz earlier this month intercepted messages from a broader swathe of American officials than has previously been reported, according to a Reuters review, potentially raising the stakes of a breach that has already drawn questions about data security in the Trump administration. Reuters identified more than 60 unique government users of the messaging platform TeleMessage in a cache of leaked data provided by Distributed Denial of Secrets, a U.S. nonprofit whose stated mission is to archive hacked and leaked documents in the public interest. The trove included material from disaster responders, customs officials, several U.S. diplomatic staffers, at least one White House staffer and members of the Secret Service. The messages reviewed by Reuters covered a roughly day-long period of time ending on May 4, and many of them were fragmentary. Once little known outside government and finance circles, TeleMessage drew media attention after an April 30 Reuters photograph showed Waltz checking TeleMessage's version of the privacy-focused app Signal during a cabinet meeting. While Reuters could not verify the entire contents of the TeleMessage trove, in more than half a dozen cases the news agency was able to establish that the phone numbers in the leaked data were correctly attributed to their owners. One of the intercepted texts' recipients – an applicant for aid from the Federal Emergency Management Agency – confirmed to Reuters that the leaked message was authentic; a financial services firm whose messages were similarly intercepted also confirmed their authenticity. Based on its limited review, Reuters uncovered nothing that seemed clearly sensitive and did not uncover chats by Waltz or other cabinet officials. Some chats did seem to bear on the travel plans of senior government officials. One Signal group, 'POTUS | ROME-VATICAN | PRESS GC,' appeared to pertain to the logistics of an event at the Vatican. Another appeared to discuss U.S. officials' trip to Jordan. Reuters reached out to all the individuals it could identify seeking comment; some confirmed their identities but most didn't respond or referred questions to their respective agencies. Reuters could not ascertain how TeleMessage had been used by each agency. The service – which takes versions of popular apps and allows their messages to be archived in line with government rules – has been suspended since May 5, when it went offline 'out of an abundance of caution.' TeleMessage's owner, the Portland, Oregon-based digital communications firm Smarsh, did not respond to requests for comments about the leaked data. The White House said in a statement that it was 'aware of the cyber security incident at Smarsh' but didn't offer comment on its use of the platform. The State Department didn't respond to messages. The Secret Service said TeleMessage products had been used 'by a small subset of Secret Service employees' and that it was reviewing the situation. FEMA said in an email that it had 'no evidence' that its information had been compromised. It didn't respond when sent copies of internal FEMA messages. A CBP spokesperson repeated a past statement noting that it had disabled TeleMessage and was investigating the breach. METADATA RISK Federal contracting data shows that State and DHS have had contracts with TeleMessage in recent years, as has the Centers for Disease Control. A CDC spokesperson told Reuters in an email Monday that the agency piloted the software in 2024 to assess its potential for records management requirements 'but found it did not fit our needs.' The status of the other contracts wasn't clear. A week after that hack, the U.S. cyber defense agency CISA recommended that users 'discontinue use of the product' barring any mitigating instructions about how to use the app from Smarsh. Jake Williams, a former National Security Agency cyber specialist, said that, even if the intercepted text messages were innocuous, the wealth of metadata – the who and when of the leaked conversations and chat groups – posed a counterintelligence risk. 'Even if you don't have the content, that is a top-tier intelligence access,' said Williams, now vice president of research and development at cybersecurity firm Hunter Strategy. Waltz's prior use of Signal created a public furor when he accidentally added a prominent journalist to a Signal chat where he and other Trump cabinet officials were discussing air raids on Yemen in real time. Soon after, Waltz was ousted from his job, although not from the administration: Trump said he was nominating Waltz to be the next U.S. ambassador to the United Nations. The circumstances surrounding Waltz's use of TeleMessage haven't been publicly disclosed and neither he nor the White House has responded to questions about the matter.

Hacker Steals Data From US Government Through App Used By Trump Aide
Hacker Steals Data From US Government Through App Used By Trump Aide

NDTV

time21-05-2025

  • Politics
  • NDTV

Hacker Steals Data From US Government Through App Used By Trump Aide

Quick Read Summary is AI generated, newsroom reviewed. A hacker breached TeleMessage, a messaging platform used by U.S. officials, leaking data from over 60 government users, including disaster responders and diplomats. The incident raises cybersecurity concerns, though no sensitive content was confirmed. Washington: A hacker who breached the communications service used by former Trump national security adviser Mike Waltz earlier this month intercepted messages from a broader swathe of American officials than has previously been reported, according to a Reuters review, potentially raising the stakes of a breach that has already drawn questions about data security in the Trump administration. Reuters identified more than 60 unique government users of the messaging platform TeleMessage in a cache of leaked data provided by Distributed Denial of Secrets, a U.S. nonprofit whose stated mission is to archive hacked and leaked documents in the public interest. The trove included material from disaster responders, customs officials, several U.S. diplomatic staffers, at least one White House staffer and members of the Secret Service. The messages reviewed by Reuters covered a roughly day-long period of time ending on May 4, and many of them were fragmentary. Once little known outside government and finance circles, TeleMessage drew media attention after an April 30 Reuters photograph showed Waltz checking TeleMessage's version of the privacy-focused app Signal during a cabinet meeting. While Reuters could not verify the entire contents of the TeleMessage trove, in more than half a dozen cases the news agency was able to establish that the phone numbers in the leaked data were correctly attributed to their owners. One of the intercepted texts' recipients - an applicant for aid from the Federal Emergency Management Agency - confirmed to Reuters that the leaked message was authentic; a financial services firm whose messages were similarly intercepted also confirmed their authenticity. Based on its limited review, Reuters uncovered nothing that seemed clearly sensitive and did not uncover chats by Waltz or other cabinet officials. Some chats did seem to bear on the travel plans of senior government officials. One Signal group, "POTUS | ROME-VATICAN | PRESS GC," appeared to pertain to the logistics of an event at the Vatican. Another appeared to discuss U.S. officials' trip to Jordan. Reuters reached out to all the individuals it could identify seeking comment; some confirmed their identities but most didn't respond or referred questions to their respective agencies. Reuters could not ascertain how TeleMessage had been used by each agency. The service - which takes versions of popular apps and allows their messages to be archived in line with government rules - has been suspended since May 5, when it went offline "out of an abundance of caution." TeleMessage's owner, the Portland, Oregon-based digital communications firm Smarsh, did not respond to requests for comments about the leaked data. The White House said in a statement that it was "aware of the cyber security incident at Smarsh" but didn't offer comment on its use of the platform. The State Department didn't respond to messages. The Secret Service said TeleMessage products had been used "by a small subset of Secret Service employees" and that it was reviewing the situation. FEMA said in an email that it had "no evidence" that its information had been compromised. It didn't respond when sent copies of internal FEMA messages. A CBP spokesperson repeated a past statement noting that it had disabled TeleMessage and was investigating the breach. METADATA RISK Federal contracting data shows that State and DHS have had contracts with TeleMessage in recent years, as has the Centers for Disease Control. A CDC spokesperson told Reuters in an email Monday that the agency piloted the software in 2024 to assess its potential for records management requirements "but found it did not fit our needs." The status of the other contracts wasn't clear. A week after that hack, the U.S. cyber defense agency CISA recommended that users "discontinue use of the product" barring any mitigating instructions about how to use the app from Smarsh. Jake Williams, a former National Security Agency cyber specialist, said that, even if the intercepted text messages were innocuous, the wealth of metadata - the who and when of the leaked conversations and chat groups - posed a counterintelligence risk. "Even if you don't have the content, that is a top-tier intelligence access," said Williams, now vice president of research and development at cybersecurity firm Hunter Strategy. Waltz's prior use of Signal created a public furor when he accidentally added a prominent journalist to a Signal chat where he and other Trump cabinet officials were discussing air raids on Yemen in real time. Soon after, Waltz was ousted from his job, although not from the administration: Trump said he was nominating Waltz to be the next U.S. ambassador to the United Nations. The circumstances surrounding Waltz's use of TeleMessage haven't been publicly disclosed and neither he nor the White House has responded to questions about the matter.

Hacker who breached communications app used by Trump aide stole data from across US government
Hacker who breached communications app used by Trump aide stole data from across US government

Straits Times

time21-05-2025

  • Politics
  • Straits Times

Hacker who breached communications app used by Trump aide stole data from across US government

The trove - which included material from disaster responders, customs officials, and members of the Secret Service - raises the stakes of a breach that has already drawn questions about data security in the Trump administration. PHOTO: REUTERS WASHINGTON - A hacker who breached the communications service used by former Trump national security adviser Mike Waltz earlier in May intercepted messages from a broader swathe of American officials than has previously been reported, according to a Reuters review. This potentially raises the stakes of a breach that has already drawn questions about data security in the Trump administration. Reuters identified more than 60 unique government users of the messaging platform TeleMessage in a cache of leaked data provided by Distributed Denial of Secrets, a US nonprofit whose stated mission is to archive hacked and leaked documents in the public interest. The trove included material from disaster responders, customs officials, several US diplomatic staffers, at least one White House staffer and members of the Secret Service. The messages reviewed by Reuters covered a roughly day-long period of time ending on May 4, and many of them were fragmentary. Once little known outside government and finance circles, TeleMessage drew media attention after an April 30 Reuters photograph showed Mr Waltz checking TeleMessage's version of the privacy-focused app Signal during a cabinet meeting. While Reuters could not verify the entire contents of the TeleMessage trove, in more than half a dozen cases the news agency was able to establish that the phone numbers in the leaked data were correctly attributed to their owners. One of the intercepted texts' recipients – an applicant for aid from the Federal Emergency Management Agency (Fema) – confirmed to Reuters that the leaked message was authentic; a financial services firm whose messages were similarly intercepted also confirmed their authenticity. Based on its limited review, Reuters uncovered nothing that seemed clearly sensitive and did not uncover chats by Mr Waltz or other cabinet officials. Some chats did seem to bear on the travel plans of senior government officials. One Signal group, 'POTUS | ROME-VATICAN | PRESS GC,' appeared to pertain to the logistics of an event at the Vatican. Another appeared to discuss US officials' trip to Jordan. Reuters reached out to all the individuals it could identify seeking comment; some confirmed their identities but most did not respond or referred questions to their respective agencies. Reuters could not ascertain how TeleMessage had been used by each agency. The service – which takes versions of popular apps and allows their messages to be archived in line with government rules – has been suspended since May 5, when it went offline 'out of an abundance of caution'. TeleMessage's owner, the Portland, Oregon-based digital communications firm Smarsh, did not respond to requests for comments about the leaked data. The White House said in a statement that it was 'aware of the cyber security incident at Smarsh' but did not offer comment on its use of the platform. The State Department did not respond to emails. The Department of Homeland Security (DHS), the parent agency for Fema, cyber defence agency Cisa, the Secret Service, and Customs and Border Protection (CPB), similarly did not respond to messages. Fema said in an email that had 'no evidence' that its information had been compromised. It didn't respond when sent copies of internal Fema messages. A CBP spokesperson repeated a past statement noting that it had disabled TeleMessage and was investigating the breach. Metadata risk Federal contracting data shows that State and DHS have had contracts with TeleMessage in recent years, as has the Centers for Disease Control (CDC). A CDC spokesperson told Reuters in an email on May 20 that the agency piloted the software in 2024 to assess its potential for records management requirements 'but found it did not fit our needs'. The status of the other contracts was not clear. A week after that hack, the Cisa recommended that users 'discontinue use of the product' barring any mitigating instructions about how to use the app from Smarsh. Mr Jake Williams, a former National Security Agency cyber specialist, said that, even if the intercepted text messages were innocuous, the wealth of metadata – the who and when of the leaked conversations and chat groups – posed a counterintelligence risk. 'Even if you don't have the content, that is a top-tier intelligence access,' said Mr Williams, now vice president of research and development at cybersecurity firm Hunter Strategy. Mr Waltz's prior use of Signal created a public furor when he accidentally added a prominent journalist to a Signal chat where he and other Trump cabinet officials were discussing air raids on Yemen in real time. Soon after, Mr Waltz was ousted from his job, although not from the administration: Mr Trump said he was nominating Mr Waltz to be the next US ambassador to the United Nations. The circumstances surrounding Mr Waltz's use of TeleMessage have not been publicly disclosed and neither he nor the White House has responded to questions about the matter. REUTERS Join ST's Telegram channel and get the latest breaking news delivered to you.

Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government
Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government

Yahoo

time21-05-2025

  • Politics
  • Yahoo

Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government

By AJ Vicens and Raphael Satter WASHINGTON (Reuters) -A hacker who breached the communications service used by former Trump national security adviser Mike Waltz earlier this month intercepted messages from a broader swathe of American officials than has previously been reported, according to a Reuters review, potentially raising the stakes of a breach that has already drawn questions about data security in the Trump administration. Reuters identified more than 60 unique government users of the messaging platform TeleMessage in a cache of leaked data provided by Distributed Denial of Secrets, a U.S. nonprofit whose stated mission is to archive hacked and leaked documents in the public interest. The trove included material from disaster responders, customs officials, several U.S. diplomatic staffers, at least one White House staffer and members of the Secret Service. The messages reviewed by Reuters covered a roughly day-long period of time ending on May 4, and many of them were fragmentary. Once little known outside government and finance circles, TeleMessage drew media attention after an April 30 Reuters photograph showed Waltz checking TeleMessage's version of the privacy-focused app Signal during a cabinet meeting. While Reuters could not verify the entire contents of the TeleMessage trove, in more than half a dozen cases the news agency was able to establish that the phone numbers in the leaked data were correctly attributed to their owners. One of the intercepted texts' recipients - an applicant for aid from the Federal Emergency Management Agency - confirmed to Reuters that the leaked message was authentic; a financial services firm whose messages were similarly intercepted also confirmed their authenticity. Based on its limited review, Reuters uncovered nothing that seemed clearly sensitive and did not uncover chats by Waltz or other cabinet officials. Some chats did seem to bear on the travel plans of senior government officials. One Signal group, "POTUS | ROME-VATICAN | PRESS GC," appeared to pertain to the logistics of an event at the Vatican. Another appeared to discuss U.S. officials' trip to Jordan. Reuters reached out to all the individuals it could identify seeking comment; some confirmed their identities but most didn't respond or referred questions to their respective agencies. Reuters could not ascertain how TeleMessage had been used by each agency. The service - which takes versions of popular apps and allows their messages to be archived in line with government rules - has been suspended since May 5, when it went offline "out of an abundance of caution." TeleMessage's owner, the Portland, Oregon-based digital communications firm Smarsh, did not respond to requests for comments about the leaked data. The White House said in a statement that it was "aware of the cyber security incident at Smarsh" but didn't offer comment on its use of the platform. The State Department didn't respond to emails. The Department of Homeland Security, the parent agency for FEMA, CISA, the Secret Service, and Customs and Border Protection, similarly did not respond to messages. FEMA said in an email that had "no evidence" that its information had been compromised. It didn't respond when sent copies of internal FEMA messages. A CBP spokesperson repeated a past statement noting that it had disabled TeleMessage and was investigating the breach. METADATA RISK Federal contracting data shows that State and DHS have had contracts with TeleMessage in recent years, as has the Centers for Disease Control. A CDC spokesperson told Reuters in an email Monday that the agency piloted the software in 2024 to assess its potential for records management requirements "but found it did not fit our needs." The status of the other contracts wasn't clear. A week after that hack, the U.S. cyber defense agency CISA recommended that users "discontinue use of the product" barring any mitigating instructions about how to use the app from Smarsh. Jake Williams, a former National Security Agency cyber specialist, said that, even if the intercepted text messages were innocuous, the wealth of metadata - the who and when of the leaked conversations and chat groups - posed a counterintelligence risk. "Even if you don't have the content, that is a top-tier intelligence access," said Williams, now vice president of research and development at cybersecurity firm Hunter Strategy. Waltz's prior use of Signal created a public furor when he accidentally added a prominent journalist to a Signal chat where he and other Trump cabinet officials were discussing air raids on Yemen in real time. Soon after, Waltz was ousted from his job, although not from the administration: Trump said he was nominating Waltz to be the next U.S. ambassador to the United Nations. The circumstances surrounding Waltz's use of TeleMessage haven't been publicly disclosed and neither he nor the White House has responded to questions about the matter.

Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government
Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government

The Star

time21-05-2025

  • Politics
  • The Star

Exclusive-Hacker who breached communications app used by Trump aide stole data from across US government

U.S. National Security Advisor Mike Waltz checks his mobile phone while attending a cabinet meeting held by U.S. President Donald Trump at the White House in Washington, D.C., U.S., April 30, 2025. REUTERS/Evelyn Hockstein WASHINGTON (Reuters) -A hacker who breached the communications service used by former Trump national security adviser Mike Waltz earlier this month intercepted messages from a broader swathe of American officials than has previously been reported, according to a Reuters review, potentially raising the stakes of a breach that has already drawn questions about data security in the Trump administration. Reuters identified more than 60 unique government users of the messaging platform TeleMessage in a cache of leaked data provided by Distributed Denial of Secrets, a U.S. nonprofit whose stated mission is to archive hacked and leaked documents in the public interest. The trove included material from disaster responders, customs officials, several U.S. diplomatic staffers, at least one White House staffer and members of the Secret Service. The messages reviewed by Reuters covered a roughly day-long period of time ending on May 4, and many of them were fragmentary. Once little known outside government and finance circles, TeleMessage drew media attention after an April 30 Reuters photograph showed Waltz checking TeleMessage's version of the privacy-focused app Signal during a cabinet meeting. While Reuters could not verify the entire contents of the TeleMessage trove, in more than half a dozen cases the news agency was able to establish that the phone numbers in the leaked data were correctly attributed to their owners. One of the intercepted texts' recipients - an applicant for aid from the Federal Emergency Management Agency - confirmed to Reuters that the leaked message was authentic; a financial services firm whose messages were similarly intercepted also confirmed their authenticity. Based on its limited review, Reuters uncovered nothing that seemed clearly sensitive and did not uncover chats by Waltz or other cabinet officials. Some chats did seem to bear on the travel plans of senior government officials. One Signal group, "POTUS | ROME-VATICAN | PRESS GC," appeared to pertain to the logistics of an event at the Vatican. Another appeared to discuss U.S. officials' trip to Jordan. Reuters reached out to all the individuals it could identify seeking comment; some confirmed their identities but most didn't respondor referred questions to their respective agencies. Reuters could not ascertain how TeleMessage had been used by each agency. The service - which takes versions of popular apps and allows their messages to be archived in line with government rules - has been suspended since May 5, when it went offline "out of an abundance of caution." TeleMessage's owner, the Portland, Oregon-based digital communications firm Smarsh, did not respond to requests for comments about the leaked data. The White House said in a statement that it was "aware of the cyber security incident at Smarsh" but didn't offer comment on its use of the platform. The State Department didn't respond to emails. The Department of Homeland Security, the parent agency for FEMA, CISA, the Secret Service, and Customs and Border Protection, similarly did not respond to messages. FEMA said in an email that had "no evidence" that its information had been compromised. It didn't respond when sent copies of internal FEMA messages. A CBP spokesperson repeated a past statement noting that it had disabled TeleMessage and was investigating the breach. METADATA RISK Federal contracting data shows that State and DHS have had contracts with TeleMessage in recent years, as has the Centers for Disease Control.A CDC spokesperson told Reuters in an email Monday that the agency piloted the software in 2024 to assess its potential for records management requirements "but found it did not fit our needs." The status of the other contracts wasn't clear.A week after that hack, the U.S. cyber defense agency CISA recommended that users "discontinue use of the product" barring any mitigating instructions about how to use the app from Smarsh. Jake Williams, a former National Security Agency cyber specialist, said that, even if the intercepted text messages were innocuous, the wealth of metadata - the who and when of the leaked conversations and chat groups - posed a counterintelligence risk. "Even if you don't have the content, that is a top-tier intelligence access," said Williams, nowvice president of research and development at cybersecurity firm Hunter Strategy. Waltz's prior use of Signal created a public furor when he accidentally added a prominent journalist to a Signal chat where he and other Trump cabinet officials were discussing air raids on Yemen in real time. Soon after, Waltz was ousted from his job, although not from the administration: Trump said he was nominating Waltz to be the next U.S. ambassador to the United Nations. The circumstances surrounding Waltz's use of TeleMessage haven't been publicly disclosed and neither he nor the White House has responded to questions about the matter. (Reporting by Raphael Satter and AJ Vicens; Editing by Chris Sanders and Anna Driver)

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store