Skip to content Skip to footer
0 items - $0.00 0

Doge software engineer’s computer infected by info-stealing malware by lysp

Doge software engineer’s computer infected by info-stealing malware by lysp

Doge software engineer’s computer infected by info-stealing malware by lysp

10 Comments

  • Post Author
    chneu
    Posted May 9, 2025 at 8:04 am

    I don't think this is on accident. It just happens that Russia leaked the information that DOGE has been giving them.

    This is what, the 3rd or 4th time we've seen strong evidence that Russia has direct access to multiple DOGE devices? Their logins keep leaking within minutes of DOGE accessing sensitive government databases.

    At this point there is no way this is on accident or it's a "hack".

    Remember Hillary's emails? They never gave a shit about those.

  • Post Author
    ndsipa_pomu
    Posted May 9, 2025 at 8:08 am

    Does the USA have an authority that can deny privileged data access to someone that has such poor operational security? Revoke security clearances, that kind of thing.

  • Post Author
    dev_l1x_be
    Posted May 9, 2025 at 8:22 am

    > a strong indication that devices belonging to him have been hacked in recent years.

    I like these kind of speculative articles. The click bait title states something with certanity than the first sentence clarifies that it is a speculation. I am not sure why we are falling for this click baity garbage, over and over.

  • Post Author
    whacko_quacko
    Posted May 9, 2025 at 8:43 am

    I don't see any evidence that this should be the case. My email appears in dumps on haveibeenpwnd too, because of database dumps. How is that evidence that there's a key logger on my system?

    Actually critisizing DOGE for their major gaffes (like putting up easily defaceable websites, or their incompetence when it comes to reading numbers accurately) is important, but this kind of article is just sad and diminishes the credibility of news journalism

  • Post Author
    hereme888
    Posted May 9, 2025 at 8:55 am

    [flagged]

  • Post Author
    joejoo
    Posted May 9, 2025 at 8:57 am

    Now imagine how many normie, computer-illiterate federal employees in fairly sensitive roles have had various credentials leaked over the past few years.

  • Post Author
    epanchin
    Posted May 9, 2025 at 9:16 am

    This article is reaching.

    I’ve logged onto secondary email accounts from PC’s that weren’t mine and could well have been infected. That’s what 2FA is for.

    I wouldn’t use a PC which isn’t mine to login to anything sensitive. A password in a leak isn’t evidence of anything.

  • Post Author
    amelius
    Posted May 9, 2025 at 9:26 am

    > “At this point it's difficult not to suspect their awful 0pSec is a choice, and that there are specific people (ahem cough cough the Russians cough) to whom they're leaking secrets, with incompetence being merely plausible deniability for their true, treasonous agenda,” one critic wrote on Mastodon.

    Good point.

  • Post Author
    palata
    Posted May 9, 2025 at 10:06 am

    Seems like people here assume that passwords were found on Have I Been Pwned. It's more than that, it's about "stealer malware":

    > […] user names and passwords for logging in to various accounts belonging to Schutt have been published at least four times since 2023 in logs from stealer malware. Stealer malware typically infects devices through trojanized apps, phishing, or software exploits.

  • Post Author
    gitroom
    Posted May 9, 2025 at 10:10 am

    Honestly, stuff like this always makes me double check my own passwords and habits. Bunch of people just roll with the same easy setup for years and act surprised later. Gotta be careful, for real.

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.