TE
테크에코
홈24시간 인기최신베스트질문쇼채용
GitHubTwitter
홈

테크에코

Next.js로 구축된 기술 뉴스 플랫폼으로 글로벌 기술 뉴스와 토론을 제공합니다.

GitHubTwitter

홈

홈최신베스트질문쇼채용

리소스

HackerNews API원본 HackerNewsNext.js

© 2025 테크에코. 모든 권리 보유.

DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage

663 포인트작성자: micahflee5일 전

25 comments

Aurornis5일 전
So one of their servers had a &#x2F;heapdump endpoint that publicly served a heap dump of the server? This whole saga is out of control.<p>This group didn’t really “publish” anything, though. They’re offering access to journalists through a request form. They’re also not saying how much actual message content they have because the 410GB of heap dumps makes for a bigger headline number.
评论 #44036980 未加载
评论 #44041554 未加载
评论 #44036970 未加载
评论 #44037300 未加载
评论 #44041338 未加载
评论 #44041909 未加载
评论 #44038789 未加载
gregorvand5일 전
TeleMessage CEO LinkedIn bio - reads like a terrible AI hatchet job:<p>&quot;At the helm of TeleMessage, my leadership is defined by strategic innovation and a steadfast commitment to advancing telecommunications solutions. With a focus on SaaS products, our team has successfully navigated the industry&#x27;s evolution, ensuring that we remain at the forefront of technological advancements. My role encompasses not only the oversight of our direction but also the cultivation of a culture that values ethical standards and collaborative success.<p>Our achievements are anchored in a proven track record of delivering results and solving complex problems with efficiency. Spearheading business development and marketing initiatives, we have established a reputation for excellence within the telecom sector. The acquisition of TeleMessage by Smarsh in 2024 stands as a testament to our team&#x27;s dedication and my leadership in driving growth and fostering a united vision.&quot;
评论 #44038673 未加载
评论 #44039526 未加载
评论 #44045123 未加载
greyface-5일 전
It&#x27;s been weeks since the initial TeleMessage revelation... has the Signal Foundation responded in any way to the news? They condemn open source third-party clients and threaten trademark litigation when people use the &quot;Signal&quot; name in interop projects. Meanwhile, total silence when a defense contractor does the same thing.
评论 #44038201 未加载
评论 #44038756 未加载
评论 #44038740 未加载
评论 #44066275 未加载
评论 #44040225 未加载
评论 #44042471 未加载
评论 #44037606 未加载
namdnay5일 전
However bad their Signal fork was, at least it was legal. What&#x27;s crazy is that this very company was also selling a cracked WhatsApp, which is a whole different kettle of fish... and people were buying it! real corporations and governments were buying this crap - it&#x27;s insane<p><a href="https:&#x2F;&#x2F;smarsh.my.salesforce.com&#x2F;sfc&#x2F;p&#x2F;#30000001FgxH&#x2F;a&#x2F;Pb000000r00H&#x2F;0aFJJ3tCViox8quTxN05CvEu53Cz22.IvHqz4o4EoIc" rel="nofollow">https:&#x2F;&#x2F;smarsh.my.salesforce.com&#x2F;sfc&#x2F;p&#x2F;#30000001FgxH&#x2F;a&#x2F;Pb000...</a>
评论 #44043359 未加载
评论 #44039468 未加载
jfritsch19845일 전
We‘re doing something way less critical at my job. But we have two pentests per year by external companies. How on earth is this level of incompetence even legal.
评论 #44038468 未加载
评论 #44039079 未加载
评论 #44038293 未加载
lubesGordi5일 전
&#x27;Heapdump&#x27; is a term I learned from debugging android applications 15 years ago. Its just a snapshot of the java processes memory. Its going to contain plaintext. Now why those heaps are available at an open http endpoint is another matter, and is the interesting point. I&#x27;m guessing the client code had that endpoint hardcoded somewhere or they saw a request to it. I&#x27;m not seeing how they could know anything about the back end or how the messages are stored from this. Did I miss something?
评论 #44043062 未加载
willmarquis5일 전
Exposing unauthenticated &#x2F;heapdump endpoints in production is a rookie mistake-especially for a service handling sensitive government comms. The presence of MD5 hashes and legacy tech like JSP just adds to the picture of poor security hygiene. This breach is a textbook case of why defense-in-depth and regular audits are non-negotiable.
评论 #44041201 未加载
评论 #44043595 未加载
WatchDog5일 전
Great example to use whenever legislators want to ban or add backdoors to e2e encryption.
udev40965일 전
The title is outright wrong and should be criticized for spreading false information. They have NOT published anything, it&#x27;s only for &quot;researchers&quot;, which is a way of saying &quot;we will write false title of this article just so we can get a lot of attention&quot;
0xbadcafebee5일 전
&gt; Because the data is sensitive and full of PII, DDoSecrets is only sharing it with journalists and researchers.<p>Yeah I&#x27;m normally a big proponent of responsible disclosure, but in this case, I think the more painful, damaging leak is required.<p>Firstly, autocrats, fascists &amp; oligarchs don&#x27;t care that much if you hack them. They will just keep using these tools (or another one just like it) ignoring the correct procedure their government already wants them to use. The citizens of affected nations need to be made angry by their leaders&#x27; failure to do their jobs correctly, and that&#x27;s only gonna happen when there are consequences for their actions. Their incompetence put their nations at risk, and now it&#x27;s clear they have failed to keep their intel safe. They have failed hard, let them fail hard.<p>Second, journalists and researchers have almost completely lost their power. In a non-democratic world (we&#x27;re nearly there, just give them a little more time), when a journalist exposes corruption or incompetency, that journalist&#x2F;researcher is simply silenced by the government. Silence the journalists and nobody knows what&#x27;s going on so oppression can continue unchecked. Every person who gets silenced has a greater chilling effect on the whole society; nobody wants to be next. This is how authoritarians gain power. Oppression with no resistance or consequence legitimizes the oppression.<p>If we were just talking about typical corporate incompetence re: security, and the only thing at stake is a single stock or individuals&#x27; data, I would say disclose responsibly. But when it comes to stopping autocracy, the gloves have to come off. They sure as shit aren&#x27;t gonna play by any rules, so neither should we.
评论 #44038095 未加载
评论 #44037396 未加载
评论 #44037679 未加载
评论 #44037516 未加载
评论 #44038646 未加载
bob_theslob6465일 전
Isn&#x27;t it against the law in the United States to use outside channels for government communications? Wasn&#x27;t this the whole scandal about Clinton? Please correct me if I am wrong.
评论 #44037668 未加载
评论 #44037749 未加载
评论 #44041459 未加载
评论 #44037736 未加载
Yizahi5일 전
I love when politicians, lobbying for the backdooring all communication software are getting pwned in the same way. Too bad they lack either brain cells or basic human empathy to make a connection between these events.
评论 #44040304 未加载
nlitsme5일 전
I think this is abuse of the word &#x27;publish&#x27;
runlevel15일 전
&quot;clean on OPSEC&quot;<p>- Pete Hegseth<p>That line simultaneously becomes funnier and more depressing.
throw75일 전
Does TM&#x27;s SGNL still work on Signal&#x27;s servers? Has Signal said that they do allow Telemessage&#x27;s custom signal client use on their servers?
pawanjswal5일 전
Wow, this whole TeleMessage leak feels like a spy thriller.
评论 #44040280 未加载
zombiwoof5일 전
If no one will persecute criminals they will keep breaking all laws
goalieca5일 전
Security standards need to start banning heap dumps.
评论 #44037538 未加载
评论 #44037733 未加载
评论 #44037991 未加载
treebeard9015일 전
&quot;We are currently clean on OPSEC&quot;
ianhawes5일 전
&gt; Because the data is sensitive and full of PII, DDoSecrets is only sharing it with journalists and researchers.<p>Sorry, but no, journalists and researchers have implicit bias.
guluarte5일 전
cannot the pentagon with their billions in funding make a secure app?
评论 #44037587 未加载
评论 #44037593 未加载
yieldcrv5일 전
beautiful, any prediction markets tied to this? I need to stop betting on those things, I’m so bad at it
TechDebtDevin5일 전
Yeah no thanks, not donating to gate keepers who want to maintain the status quo. I&#x27;ll give my coin to wiki leaks and groups with balls.
labadal5일 전
I&#x27;m someone who is building a messaging app, and I make sure we subscribe to the &quot;nothing to hide, nothing to fear&quot; philosophy. But in our case it&#x27;s collect nothing so there&#x27;s no data to steal even if we get hacked.
ayrtondesozzla5일 전
<a href="https:&#x2F;&#x2F;nitter.net&#x2F;ProjPM&#x2F;status&#x2F;1915527064070881379#m" rel="nofollow">https:&#x2F;&#x2F;nitter.net&#x2F;ProjPM&#x2F;status&#x2F;1915527064070881379#m</a><p>Is this group not very seriously discredited, with ties to FBI, convicted child porn criminals, etc? Or am I getting something mixed up?<p>This could still be a legitimate leak, of course. I&#x27;m just wondering if this info is publically known, or if I&#x27;m conflating things