We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

The TeleMessage App Used by Trump Officials Has Been Hacked

The TeleMessage App Used by Trump Officials Has Been Hacked
Husain Parvez First published on May 07, 2025 Cybersecurity Researcher

A hacker has breached TeleMessage, a messaging platform used by US government officials to archive encrypted chats — compromising sensitive data and prompting the service to suspend operations. The platform, developed by an Israeli company and owned by Oregon-based Smarsh, drew scrutiny after a photo surfaced showing the former National Security Advisor Mike Waltz using the app during a Cabinet meeting with President Trump.

The breach, first reported by 404 Media, affected modified versions of Signal, Telegram, WhatsApp, and WeChat offered by TeleMessage. While high-ranking officials like Waltz, JD Vance, and Marco Rubio were not directly compromised, the hacker accessed archived content and login credentials linked to users at Customs and Border Protection, Coinbase, and Scotiabank. “The hacker has not obtained the messages of cabinet members, Waltz, and people he spoke to,” 404 Media noted, but the exposure of backend systems raises serious concerns about the platform’s structural integrity.

The Guardian noted that concerns “were further heightened when it was reported... that a hacker had broken into TeleMessage’s back-end infrastructure and intercepted some of its users’ messages” — highlighting how message-archiving features can undermine the perceived security of encrypted apps.

The situation highlights a recurring pattern in Trump-era tech policy, where rushed implementations of digital tools often clash with privacy best practices. Earlier this year, we reported how Trump postponed a long-threatened TikTok ban, citing vague national security reforms — reflecting the administration’s inconsistent tech governance. This breach also echoes the growing threat of imitation apps, as last year, over 60,000 Android users were infected by spyware through fake Telegram apps.

TeleMessage had been marketed as a compliance-focused platform for archiving encrypted messages, particularly in public sector settings. But Signal’s official stance was clear: “We cannot guarantee the privacy or security properties of unofficial versions of Signal,” a spokesperson told NBC News.

Trump himself, after the infamous “Signalgate” incident, said, “I think we learned: Maybe don’t use Signal, okay?” Still, the tools persisted in the administration’s communication ecosystem, culminating in this security failure.

While Smarsh says its other products remain unaffected, the hack has reignited debate over whether modified encrypted platforms can ever fully reconcile security and compliance — especially in high-stakes government environments.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address