This article is within the scope of WikiProject Technology, a collaborative effort to improve the coverage of technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.TechnologyWikipedia:WikiProject TechnologyTemplate:WikiProject TechnologyTechnology
This article is within the scope of WikiProject Science, a collaborative effort to improve the coverage of Science on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ScienceWikipedia:WikiProject ScienceTemplate:WikiProject Sciencescience
This article is within the scope of WikiProject Israel, a collaborative effort to improve the coverage of Israel on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.IsraelWikipedia:WikiProject IsraelTemplate:WikiProject IsraelIsrael-related
I’m posting this suggestion in line with Wikipedia’s Conflict of Interest (COI) guidelines. I work in the enterprise messaging space and want to ensure the TeleMessage article reflects complete, well-sourced information about the recent May 2025 cybersecurity incident.
The current article briefly mentions that TeleMessage was hacked, but omits key developments — including service suspension, U.S. government agency responses, and an official CISA advisory. Here's a proposed neutrally-worded addition for the end of the "History" section:
> In the days following the disclosure, it was revealed that TeleMessage had experienced a serious cybersecurity breach. On May 5, 2025, the company’s parent, Smarsh, suspended all TeleMessage services while investigating the incident. U.S. Customs and Border Protection also disabled the app on government-issued phones. Subsequent reporting confirmed that the breach exposed chat logs, contact lists, and internal system credentials for clients including federal employees, Coinbase, and Scotiabank. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) identified the vulnerability as CVE-2025-47729 and added it to its Known Exploited Vulnerabilities Catalog. CISA further recommended that all federal agencies and users discontinue use of TeleMessage products until the issue was remediated.