We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

The TeleMessage App Used by Trump Officials Has Been Hacked

The TeleMessage App Used by Trump Officials Has Been Hacked
Author Image Husain Parvez
Husain Parvez Published on May 07, 2025 Cybersecurity Researcher

A hacker has breached TeleMessage, a messaging platform used by US government officials to archive encrypted chats — compromising sensitive data and prompting the service to suspend operations. The platform, developed by an Israeli company and owned by Oregon-based Smarsh, drew scrutiny after a photo surfaced showing the former National Security Advisor Mike Waltz using the app during a Cabinet meeting with President Trump.

The breach, first reported by 404 Media, affected modified versions of Signal, Telegram, WhatsApp, and WeChat offered by TeleMessage. While high-ranking officials like Waltz, JD Vance, and Marco Rubio were not directly compromised, the hacker accessed archived content and login credentials linked to users at Customs and Border Protection, Coinbase, and Scotiabank. “The hacker has not obtained the messages of cabinet members, Waltz, and people he spoke to,” 404 Media noted, but the exposure of backend systems raises serious concerns about the platform’s structural integrity.

The Guardian noted that concerns “were further heightened when it was reported... that a hacker had broken into TeleMessage’s back-end infrastructure and intercepted some of its users’ messages” — highlighting how message-archiving features can undermine the perceived security of encrypted apps.

The situation highlights a recurring pattern in Trump-era tech policy, where rushed implementations of digital tools often clash with privacy best practices. Earlier this year, we reported how Trump postponed a long-threatened TikTok ban, citing vague national security reforms — reflecting the administration’s inconsistent tech governance. This breach also echoes the growing threat of imitation apps, as last year, over 60,000 Android users were infected by spyware through fake Telegram apps.

TeleMessage had been marketed as a compliance-focused platform for archiving encrypted messages, particularly in public sector settings. But Signal’s official stance was clear: “We cannot guarantee the privacy or security properties of unofficial versions of Signal,” a spokesperson told NBC News.

Trump himself, after the infamous “Signalgate” incident, said, “I think we learned: Maybe don’t use Signal, okay?” Still, the tools persisted in the administration’s communication ecosystem, culminating in this security failure.

While Smarsh says its other products remain unaffected, the hack has reignited debate over whether modified encrypted platforms can ever fully reconcile security and compliance — especially in high-stakes government environments.

About the Author

  • Author Image Husain Parvez
  • Husain Parvez Cybersecurity Researcher

Husain Parvez is a Cybersecurity Researcher and News Writer at The How To Guide, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the The How To Guide Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address