Loading cryptocurrency prices...

Hackers Target TeleMessage App via CVE-2025-48927 Vulnerability

TeleMessage Vulnerability Exploited by Hackers, Leading to Data Breaches and Rising Crypto Theft in 2025

  • Hackers continue exploiting a key vulnerability in TeleMessage, affecting critical endpoints.
  • The flaw enables attackers to extract data from unprotected systems using the Spring Boot Actuator framework.
  • GreyNoise detected 11 IPs actively trying to exploit the bug, and over 2,000 performing related scans since April.
  • TeleMessage reported patching the vulnerability after a security breach led to stolen files in May 2024.
  • Chainalysis reports over $2.17 billion lost to crypto theft in 2025, driven by social engineering and Malware.

Hackers are working to exploit a vulnerability, known as CVE-2025-48927, in the TeleMessage messaging app. A report from threat intelligence firm GreyNoise confirms that attackers continue to target this flaw, which allows unauthorized data extraction from affected systems.

- Advertisement -

The issue stems from the Spring Boot Actuator framework, where a diagnostic endpoint called /heapdump was publicly accessible without a password. According to GreyNoise, their monitoring detected 11 IP addresses attempting direct exploits of the flaw since April. In addition, over 2,000 other IP addresses searched for Actuator endpoints, with 1,582 focusing on the /health feature that helps find vulnerable installations.

The GreyNoise team told Cointelegraph that the problem comes from using old confirmation methods in Spring Boot Actuator, making the /heapdump endpoint easy for Hackers to reach. “TeleMessage has stated that the vulnerability has been patched on their end,” said Howdy Fisher from GreyNoise. “However, patch timelines can vary depending on a variety of factors.”

TeleMessage, which operates similarly to Signal but offers chat archiving for compliance, is used by government organizations and companies such as US Customs and Border Protection and crypto exchange Coinbase. In May 2024, the app suspended services after a security breach led to files being stolen. The company was acquired by US-based Smarsh earlier in the year, as noted in a press release.

GreyNoise recommends users block suspicious IPs and restrict access to the /heapdump endpoint. Limiting exposure to all Actuator endpoints can also help prevent attacks, according to their report.

- Advertisement -

Cybersecurity threats targeting crypto users are on the rise in 2025. According to a report by Chainalysis, over $2.17 billion has been stolen through various methods including phishing, malware, and physical attacks. High-profile cases include the Bybit exchange hack in February. Users of vulnerable apps may include former US government officials, as highlighted in this NBC report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...

Peraire-Bueno Bros Face Retrial in $25M Ethereum Fraud Case

Anton and James Peraire-Bueno face a potential retrial for alleged fraud and money laundering...
- Advertisement -

Must Read

Sushiswap vs Uniswap, What are the differences between these dex?

It's no secret that the world of decentralized exchanges has exploded in recent years. Many of you are probably wondering what the difference is...