DDoSecrets 发布了 410 GB 的堆转储文件,这些文件是从 TeleMessage 窃取的。
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage

原始链接: https://micahflee.com/ddosecrets-publishes-410-gb-of-heap-dumps-hacked-from-telemessages-archive-server/

程序员、记者和隐私倡导者米卡详细描述了围绕以色列公司TeleMessage的“SignalGate”事件的持续进展。TeleMessage公司致力于存档Signal等加密消息应用。事件始于时任国家安全顾问迈克·沃尔兹使用TeleMessage修改后的Signal版本(TM SGNL)与图尔西·加巴德和JD·万斯等人士进行沟通。米卡发布了TM SGNL的源代码,随后揭露了TeleMessage关于端到端加密的虚假声明。 进一步调查发现了一个主要的服务器漏洞,访问特定URL即可暴露明文聊天记录和其他敏感数据。这导致DDoSecrets发布了2025年5月4日410 GB的TeleMessage堆转储。这些转储包含明文消息和元数据。由于数据敏感性,DDoSecrets仅向记者和研究人员开放访问权限。作为DDoSecrets成员的米卡强调了该组织需要资金来继续其有影响力的工作。

Hacker News的一个帖子讨论了DDoSecrets公布的410 GB从TeleMessage窃取的堆转储。一个用户指出TeleMessage有一个公开的端点用于提供堆转储。另一个用户推测以色列软件公司的能力,并将他们的失败与摩萨德的关联联系起来。这遭到了另一个用户的质疑。另一个用户批评该软件,质疑其质量和成本。反驳意见认为这些更改是出于法律对信息存档的要求。 不同的用户责怪美国高级官员在使用该软件时缺乏尽职调查,并提出了以色列人故意进行情报收集的可能性。最后一位用户对感知到的无能表示遗憾,而另一位用户则澄清说这些合同早于现任政府,并附上了相关资料链接。最后一位用户质疑该软件过去的用途和安全要求。

原文

This morning, Distributed Denial of Secrets published 410 GB of data hacked from TeleMessage, the Israeli firm that makes modified versions of Signal, WhatsApp, Telegram, and WeChat that centrally archive messages. Because the data is sensitive and full of PII, DDoSecrets is only sharing it with journalists and researchers.

There's a lot of background, so here's a quick timeline of events with relevant links:

  • March: Then-national security advisor Mike Waltz invited a journalist into a Signal group where they planned war crimes. This led to Congressional hearings about Trump officials using Signal groups to discuss classified information.
  • May 1: Waltz (the day he was demoted from position of national security advisor) was photographed using TM SGNL, a modified version of Signal made by TeleMessage. He had texts up with Tusli Gabbard, JD Vance, and Marco Rubio.
  • May 3: I published the source code of the TM SGNL to GitHub.
  • May 4: TeleMessage got hacked, which I reported in 404 Media with Joseph Cox.
  • May 5: TeleMessage got hacked again by someone else, as NBC News reported.
  • May 6: I published analysis of the TM SGNL source code, along with some of the hacked data, that prove the TeleMessage lied about its products supporting end-to-end encryption.
  • May 18: I published details about the TeleMessage server's vulnerability in WIRED. TLDR: if anyone on the internet loaded the URL archive.telemessage.com/management/heapdump, they would download a Java heap dump from TeleMessage's archive server, containing plaintext chat logs, among other things.

Now, DDoSecrets has published 410 GB of these TeleMessage heap dumps. Here's the DDoSecrets description of the release:

Thousands of heap dumps taken May 4, 2025 from TeleMessage, which produces software used to archive encrypted messaging apps such as Signal and WhatsApp. The service came to public notice in 2025 when it was reported that former national security adviser Mike Waltz used TeleMessage while communicating with members of the Trump administration, including Vice President JD Vance and Director of National Intelligence Tulsi Gabbard. TeleMessage has been used by the federal government since at least February 2023.

Some of the archived data includes plaintext messages while other portions only include metadata, including sender and recipient information, timestamps, and group names. To facilitate research, Distributed Denial of Secrets has extracted the text from the original heap dumps.

It seems that the SignalGate saga of staggering incompetence is not yet complete. I'm digging into this data right now. It's bonkers.

Note: I'm a member of the DDoSecrets collective. If you can, donate! DDoSecrets operates on a shoestring budget and does incredibly impactful work.

联系我们 contact @ memedata.com