Hasty Briefsbeta

Bilingual

DOGEs K Schutt's computer infected by malware, credentials found in stealer logs

a year ago
  • #Malware
  • #Cybersecurity
  • #Data Breach
  • Kyle Schutt, a DOGE software engineer, had his computer infected with malware, leading to his credentials appearing in multiple stealer log datasets.
  • His email address was found in 51 data breaches, including major incidents like Adobe (2013), LinkedIn (2016), and Gravatar (2020).
  • Stealer logs are collections of credentials obtained via malware, which can record keystrokes and form inputs from infected devices.
  • Schutt's credentials appeared in four stealer log datasets: Naz.API (2023), Stealer Logs Posted to Telegram (2024), Stealer Logs, Jan 2025, and ALIEN TXTBASE Stealer Logs (2025).
  • Best practices for account security include using a password manager, strong unique passwords, and enabling two-factor authentication (2FA).
  • There is concern that DOGE staff might be using personal devices for work, potentially exposing sensitive data if infected with malware.
  • Kyle Schutt's Google Calendar is publicly accessible, though event details are hidden.