Signalgate solved? Report claims journalist’s phone number accidentally saved under name of Trump official
- Reference: 1743984910
- News link: https://www.theregister.co.uk/2025/04/07/infosec_news_roundup_in_brief/
- Source link:
A Sunday [1]report , citing sources familiar with a White House investigation into the matter, claims that during the 2024 US election campaign Goldberg emailed the Trump campaign with questions for a story.
That email reached campaign staffer Brian Hughes, who apparently wanted Waltz – then a surrogate spokesperson for the Trump campaign – to be aware of Goldberg’s inquiries so he could offer informed comment if a story appeared.
[2]
Hughes therefore sent Goldberg’s inquiry, which included the journalist’s phone number, to Waltz.
[3]
[4]
Waltz then reportedly saved Goldberg’s phone number into his contact file for Hughes.
Several months after that exchange, Hughes was working at the National Security Council and Waltz decided to include him in the now-infamous “Houthi PC small group” Signal group he used to discuss a planned attack on Houthi rebels in Yemen.
[5]
As a phone number he’d saved for Hughes was actually Goldberg’s phone number, the journalist was invited to the group.
The rest is history: Goldberg [6]reported that Trump administration officials used Signal instead of the US government’s own secure comms channels, putting sensitive info at risk and perhaps violating government records-keeping requirements.
The Guardian report emerged after Politico reported Waltz may have set up 20 or more chats in which sensitive government info was discussed on Signal.
[7]
Citing four unnamed sources, Politico reported discussions on Ukraine, China, and Gaza were conducted on Signal.
"Waltz built the entire [National Security Council] communications process on Signal," one of the sources told Politico.
Google re-patches Quick Share flaws it flubbed first time around
Google botched a fix for 10 vulnerabilities in the Windows version of its Quick Share data transfer software, according to researchers at attack simulation firm SafeBreach.
The vulns were [8]discussed by SafeBreach in August 2024 at the DefCon conference, where the company’s researchers explained they could be chained to achieve full remote code execution on any Windows machine that had Quick Share enabled.
Google responded to the vulnerabilities, dubbed "QuickShell," by issuing fixes for [9]CVE-2024-38271 and [10]CVE-2024-38272 , and updating Quick Share
In a blog post published last week, SafeBreach research team leader Or Yair [11]reported his testing of the QuickShell patches uncovered a pair of serious shortcomings.
The first alleged mistake was in Google’s fix for a remote denial of service issue triggered by file names with invalid UTF8 continuation bytes. Yair and his colleague Shmuel Cohen claim Google’s fixes only solved the problem for files they provided as proofs of concept for the flaw.
"Google added code that verifies that file names do not start with specifically null terminators," Yair wrote. "We could still exploit this vulnerability by using a file name that contains a different invalid UTF8 continuation byte."
The second mistake saw Google attempt, and apparently fail, to patch a remote unauthorized file write issue in the exploit chain. SafeBreach asserts that Google’s fix doesn’t prevent unauthorized writes, and only deleted a single file when a Quick Share session ends.
"Our assumption was that [sending a second file] might confuse Quick Share into thinking that there was only one 'Unknown File' to delete," Yair predicted. "Our hypothesis was confirmed."
Google has since issued yet [12]another CVE and fix for the issue. Quick Share for Windows version 1.0.2002.2 and more recent versions include the fix.
Yair said this should serve as a lesson to fix problems, not symptoms.
"Even when code is complex, vendors should always address the real root cause of vulnerabilities that they fix," Yair concluded of the whole QuickShell saga. "The implications are relevant to the software industry as a whole."
Critical vulnerabilities of the week: It's April, fools
Apache last week released version 1.15.1 of is Parquet general-purpose columnar file format last week, in part to address the CVSS 10.0 vulnerability [13]CVE-2025-30065 in it this week. The vuln allows attackers to execute arbitrary code.
Cisco last week warned that [14]two flaws in its Smart Licensing Utility are being exploited. The flaws can allow an unauthenticated, remote attacker to collect information, or perform administrator-level tasks, on affected systems while the software is running. Cisco updated the Utility in September 2024.
Fediverse bug bounty launched
Security researchers interested in open source and distributed software, take notice: Open source governance foundation Nivenly is launching a limited bug bounty trial program for anyone able to suss out security flaws in Mastodon, Lemy, Funkwhale, PeerTube and other eligible “Fediverse” projects.
According to a [15]blog post published last week, Nivenly is offering $250 for anyone who identifies a vulnerability or contributes a patch for a flaw with a CVSS score of between 7.0 and 8.9, while critical vulnerabilities with a CVSS score of 9.0+ will be worth $500.
As this is a "time and funds limited" run, there's $5,000 up for grabs between now and September 30, 2025. Individual contributors are only eligible for up to $1,000 in payouts.
The Fediverse is a loose alliance of social media services that allow the content they carry to be federated into a single feed if users choose to do so.
[16]Oracle Health reportedly warns of info leak from legacy server
[17]Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns
[18]FCC stands up Council on National Security to fight China in ways that CISA used to
[19]Microsoft admits GitHub hosted malware that infected almost a million devices
Baltimore bilked in 'sophisticated' vendor fraud scheme
The city government of Baltimore, Maryland last week [20]admitted it lost almost a million dollars after falling victim to a sophisticated vendor impersonation scam.
[21]According to local news sources, an unknown miscreant spent months posing as a vendor employee, using classic vendor impersonation tricks like changing the vendor's bank account information and convincing the city to send them two payments - one for $721,000 and another for $803,000. The former has been recovered, the latter is still reportedly missing.
The scammer apparently went to great lengths to fool their victims, supplying legitimate documentation for the bank account information change. The crims also reportedly used a Starlink account to mask their IP address, which helped them to avoid geofencing technology used by city systems to block offshore scammers.
"They have very good technology and so it requires us to be constantly vigilant so that we're one step ahead," Baltimore deputy Comptroller Erika McClammy told The Baltimore Banner. "In this instance, we were one step behind."
Another week, another critical WordPress plugin vulnerability
WordPress plugins are often found to include serious security vulnerabilities, and we have a couple more to report this week – both in the “WP Ultimate CSV Importer” plugin, a tool that does what it says on the tin and has over 20,000 active installations.
WordFence, a company that makes security plugins for WordPress and also runs a bug bounty program focused on plugins, last week [22]reported a pair of significant flaws in a WordPress plugin called “WP Ultimate CSV Importer”. The bugs include a CVSS 8.8 arbitrary file upload vulnerability ( [23]CVE-2025-2008 ) and a CVSS 8.1 arbitrary file deletion vulnerability ( [24]CVE-2025-2007 ).
When exploited together, an authenticated attacker with subscriber-level access to a site that uses WP Ultimate CSV Importer can potentially take control and even delete core WordPress files like wp-config.php .
A patch is available - anyone using the affected plugin should be sure they are on version 17.9.1 or a mor recent update. ®
Get our [25]Tech Resources
[1] https://www.theguardian.com/us-news/2025/apr/06/signal-group-chat-leak-how-it-happened
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z_NN5Zxq8U9_kNZpzFEe-gAAAAo&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_NN5Zxq8U9_kNZpzFEe-gAAAAo&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_NN5Zxq8U9_kNZpzFEe-gAAAAo&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_NN5Zxq8U9_kNZpzFEe-gAAAAo&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2025/03/24/signal_atlantic_security_disaster/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_NN5Zxq8U9_kNZpzFEe-gAAAAo&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2024/08/10/google_quick_share_rce/
[9] https://www.cve.org/cverecord?id=CVE-2024-38271
[10] https://www.cve.org/cverecord?id=CVE-2024-38272
[11] https://www.theregister.com/2024/08/10/google_quick_share_rce/
[12] https://www.cve.org/cverecord?id=CVE-2024-10668
[13] https://nvd.nist.gov/vuln/detail/CVE-2025-30065
[14] https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw
[15] https://nivenly.org/blog/2025/04/01/nivenly-fediverse-security-fund/
[16] https://www.theregister.com/2025/03/30/infosec_news_in_brief/
[17] https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/
[18] https://www.theregister.com/2025/03/16/infosec_news_in_brief/
[19] https://www.theregister.com/2025/03/10/infosec_in_brief/
[20] https://comptroller.baltimorecity.gov/news/press-release-comptroller/2025-04-01-release-office-comptroller-statement-vendor-fraud-incident
[21] https://www.thebaltimorebanner.com/politics-power/local-government/fake-vendor-baltimore-city-fbi-6H3FEECYS5A3JNK2BMOMCXWNTY/
[22] https://www.wordfence.com/blog/2025/03/20000-wordpress-sites-affected-by-arbitrary-file-upload-and-deletion-vulnerabilities-in-wp-ultimate-csv-importer-wordpress-plugin/
[23] https://nvd.nist.gov/vuln/detail/CVE-2025-2008
[24] https://nvd.nist.gov/vuln/detail/CVE-2025-2007
[25] https://whitepapers.theregister.com/
Cockamamie
Is that really the best they could come up with!?!? (for that Hughes-Waltz-Golberg classified snafu Signalgate thing)
Re: Cockamamie
There is [1]a better explanation here .
(Where is the clown's icon?)
[1] https://www.dailykos.com/stories/2025/3/31/2313425/-Cartoon-The-group-chat
Re: Cockamamie
"Waltz built the entire [National Security Council] communications process on Signal,"
It was a controlled leak. No one was sacked.
Re: Cockamamie
Part of the very stable genius's five-dimensional chess play?
Re: Cockamamie
Oh look, excuse number .... lost count. JFC, how will we in the US ever get ourselves out of this catastrophe that people like this got us into? I did my part last Nov. but idiocracy won anyway. Mid-terms here we come, assuming we can stay out of that hand basket to hell until then.
Re: Cockamamie
To be fair, it sound's about right ... It's not all that surprising that one of trump's idiot appointees hasn't a clue how simple email works.
Frankly, I'd be absolutely shocked if the collective IQ of the current Cabinet exceeded 75.
Not that I think IQ means diddly squat, you understand ... but it would be fun to find out anyway :-)
Re: Cockamamie
On a good day with the wind at their backs, maybe. They are clearly working on and succeeding in ways never seen before with how low can they go.
Re: Cockamamie
This is the ultimate next level (boss level) to dog-ate-my-assignment.
Bugs and Blackhats
"As this is a "time and funds limited" run, there's $5,000 up for grabs"
And I heard of Blackhats paying 50k+ for vulns. Do these guys really expect anyone to report to them ?
Re: Bugs and Blackhats
It's $250 per bug, and limited to $1000 for any individual.
As a long-term, card-carrying FOSS hacker I'd probably just report the bug normally and tell 'em to stick the "money" up their arse ... I don't get out of bed for that little, it's a complete insult to my (and many others) time and abilities.
Re: Bugs and Blackhats
It's not ideal, but in many cases, it can be enough just to make it clear that you accept vulnerabilities and provide a way for the reports to get to someone who will read them and has a clue what they're looking at. I've had to report vulns to companies before, never received a bounty of any size for them, but knowing that there is a way to send them to the security team rather than sending something to customer support and hoping they can direct it from there really helps with my confidence and, in my experience, the chance that anything will happen.
I've also been on the other side of the bug bounty report system, and maybe having a lower payout will somewhat reduce the number of incorrect or junk submissions sent in. That is probably optimistic, but I can hope. In my experience, a lot of people who find vulnerabilities want to see them fixed more than just getting a payment. Even the highest offers, except cartoonish ones that are probably never going to get granted to anyone, exist, they're usually for bugs so bad that you could still theoretically make more by selling them to someone malicious. For example, that one that [1]Apple gave $100k for , that would probably have sold for a bit more than that as a zero-day. But a lot of people would be unwilling to sell it as such and many who would be willing don't know how to find the people who buy such things. You also have to add a premium to the price you receive for hiding your illegal actions. Hoping to outbid criminals is difficult for people who don't have an Apple-sized bank account, but you may not need to.
[1] https://www.theregister.com/2022/01/26/apple_filesharing_exploit/
A campaign staffer
Needs top level war info in real time?
If you believe that I have a large bridge in Brooklyn for sale.
Re: A campaign staffer
Is that the big beautiful like no one has ever seen before bridge? There is someone (soon to be more) in this thread that is interested
Re: A campaign staffer
The article says: "a campaign staffer who later took a job at the US National Security Council official".
Typo in the sentence aside, you'd have to know what exactly this person was doing at the NSC to know how plausible the story is, but they would be included on the basis of their current job, not what they did last year. One might also question whether the kind of things done by a campaign staffer are sufficient to be a good employee in national security areas, but since we have little information about what actions they took in either place or what other experience they might have had, we don't have enough data. Of course, that story could also be false, but it isn't as unrealistic as your comment suggests.
The Guardian report
And the POTUS is "not a fan of The Guardian " either.
New Number
From: 202 771 xyz
"Hey guys, got a new number. Update your contact.
"-J Vance"