- An researcher states that the data of a Doge employee were found in four infants records
- A security expert states that the employee was not pirate
- From the Waltz signal fiasco, the security hygiene of the US government employees. UU. It is being analyzed
A Dogle worker has infected his personal computer for infostaler malware on multiple occasions, says a researcher, insinuating that the security failures of the United States government pass the Mike Waltz signal fiasco. However, not everyone agrees with this evaluation.
As collected by the registration, recently a security researcher named Micah Lee took a closer look at the safety position of a Kyle Schutt, supposedly a “37 -year -old Doge Software Engineer.” Wired also reported that Schutt was “in the CISA staff.”
Lee states that Schutt’s personal computer was compromised by infostalar malware at least four times so far, saying that they found their data in four infant records of different infants.
Infested malware
“Stealer records are collections of URLs matched with usernames and passwords, compiled with malware help. If malware infects your device, you can do things such as register The person who controls malware.
Lee also said that he does not know enough about these incidents: when they occurred, and if they occurred on Schutt’s personal or work devices (or a single device that does both).
The media quickly rushed to this information, but not everyone agrees with Lee’s evaluation. For example, Alon Gal, CTO and co -founder of Hudson Rock, an Israeli cybersecurity company that specializes in cybercrime intelligence, believes that Schutt was not infected by malware and believes that Lee’s investigation does not mean anything:
“I checked the data myself, and this is not true,” Gal said in a LinkedIn post. “Since the article has been collected and is currently viral, I thought it would make it clear that Kyle Schutt was not infected by malware,” he added.
Through The registration




