DOGEs K Schutt's computer infected by malware, credentials found in stealer logs
a year ago
- #Malware
- #Cybersecurity
- #Data Breach
- Kyle Schutt, a DOGE software engineer, had his computer infected with malware, leading to his credentials appearing in multiple stealer log datasets.
- His email address was found in 51 data breaches, including major incidents like Adobe (2013), LinkedIn (2016), and Gravatar (2020).
- Stealer logs are collections of credentials obtained via malware, which can record keystrokes and form inputs from infected devices.
- Schutt's credentials appeared in four stealer log datasets: Naz.API (2023), Stealer Logs Posted to Telegram (2024), Stealer Logs, Jan 2025, and ALIEN TXTBASE Stealer Logs (2025).
- Best practices for account security include using a password manager, strong unique passwords, and enabling two-factor authentication (2FA).
- There is concern that DOGE staff might be using personal devices for work, potentially exposing sensitive data if infected with malware.
- Kyle Schutt's Google Calendar is publicly accessible, though event details are hidden.