TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

DOGE engineer's credentials found in past public leaks from info-stealer malware

293 pointsby lysp9 days ago

16 comments

whacko_quacko9 days ago
I don&#x27;t see any evidence that this should be the case. My email appears in dumps on haveibeenpwnd too, because of database dumps. How is that evidence that there&#x27;s a key logger on my system?<p>Actually critisizing DOGE for their major gaffes (like putting up easily defaceable websites, or their incompetence when it comes to reading numbers accurately) is important, but this kind of article is just sad and diminishes the credibility of news journalism
评论 #43934934 未加载
评论 #43934946 未加载
评论 #43935111 未加载
评论 #43934970 未加载
dev_l1x_be9 days ago
&gt; a strong indication that devices belonging to him have been hacked in recent years.<p>I like these kind of speculative articles. The click bait title states something with certanity than the first sentence clarifies that it is a speculation. I am not sure why we are falling for this click baity garbage, over and over.
评论 #43934930 未加载
评论 #43935138 未加载
评论 #43934868 未加载
评论 #43935635 未加载
palata9 days ago
Seems like people here assume that passwords were found on <i>Have I Been Pwned</i>. It&#x27;s more than that, it&#x27;s about &quot;stealer malware&quot;:<p>&gt; [...] user names and passwords for logging in to various accounts belonging to Schutt have been published at least four times since 2023 in logs from stealer malware. Stealer malware typically infects devices through trojanized apps, phishing, or software exploits.
评论 #43935425 未加载
ndsipa_pomu9 days ago
Does the USA have an authority that can deny privileged data access to someone that has such poor operational security? Revoke security clearances, that kind of thing.
评论 #43934774 未加载
评论 #43934905 未加载
评论 #43934766 未加载
评论 #43934770 未加载
评论 #43934772 未加载
评论 #43934867 未加载
评论 #43935317 未加载
评论 #43934890 未加载
tjpnz9 days ago
Under normal circumstances if that system were connected to an internal network there would be a cleanup (and the costs would be astronomical). I say normal circumstances because I fully expect these clowns to obfuscate, omit and deny everything for the next four years.
sys_647389 days ago
All thee DOGE dudes are destined to spend life imprisoned on Alcatraz. The scope of the antics done by these people and the downright disregard for security, ethics, law, and the Constitution, all make them the right people to make examples of.
评论 #43936159 未加载
ChrisArchitect9 days ago
Source:<p><i>DOGEs K Schutt&#x27;s computer infected by malware, credentials found in stealer logs</i><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43930267">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43930267</a>
ninalanyon9 days ago
Was he using his own computer? He should surely have been using one provided by the institution. In a properly secured system he should not have needed passwords to connect to databases, they should have been secured by something like Active Directory roles and certificates. Do any of these US institutions have any idea of proper security?
评论 #43943332 未加载
constantcrying9 days ago
The article title <i>suggests</i> that this is about his current PC which he is using at the agency. That is totally false.<p>In fact the story is that <i>at someone point in the past</i> at least in 2013 some credentials of his landed in multiple breaches. Some of my credentials also appear there, this of course means <i>nothing</i> at all about his current account security or the security of the data.<p>I don&#x27;t even know what the allegations are. Can you not ever work for a government agency when any account of yours gets compromised? Databreaches aren&#x27;t that uncommon, presumably many people here have <i>some</i> credentials leaked, do you think these people should be excluded from working jobs in the government?
Incipient9 days ago
Haha noice.<p>I don&#x27;t think anyone really needs to express more at this point.
guiambros8 days ago
Garbage clickbait article.<p>Buried down the text, they have the plausible deniability disclaimer:<p>&quot;<i>As Lee notes, the presence of an individual’s credentials in such logs isn’t automatically an indication that the individual himself was compromised or used a weak password. In many cases, such data is exposed through database compromises that hit the service provider. The steady stream of published credentials for Schutt, however, is a clear indication that the credentials he has used over a decade or more have been publicly known at various points.</i>&quot;<p>Of course &quot;credentials have been exposed&quot;: the vast majority of sites have been hacked. It doesn&#x27;t mean this person used the <i>same</i> credentials everywhere, AND that they didn&#x27;t use 2FA, AND that the credentials matter in the first place. And, of course, this has absolutely nothing to do with malware.<p>Shame on you ARS for publishing purely speculative posts.
mystified50169 days ago
They&#x27;re saving the government lots of money by streamlining the data exfiltration.
amelius9 days ago
&gt; “At this point it&#x27;s difficult not to suspect their awful 0pSec is a choice, and that there are specific people (<i>ahem</i> <i>cough cough</i> the Russians <i>cough</i>) to whom they&#x27;re leaking secrets, with incompetence being merely plausible deniability for their true, treasonous agenda,” one critic wrote on Mastodon.<p>Good point.
评论 #43935824 未加载
评论 #43935694 未加载
评论 #43938192 未加载
评论 #43935341 未加载
评论 #43935514 未加载
gitroom9 days ago
Honestly, stuff like this always makes me double check my own passwords and habits. Bunch of people just roll with the same easy setup for years and act surprised later. Gotta be careful, for real.
评论 #43935728 未加载
joejoo9 days ago
Now imagine how many normie, computer-illiterate federal employees in fairly sensitive roles have had various credentials leaked over the past few years.
评论 #43935139 未加载
评论 #43935787 未加载
评论 #43937996 未加载
epanchin9 days ago
This article is reaching.<p>I’ve logged onto secondary email accounts from PC’s that weren’t mine and could well have been infected. That’s what 2FA is for.<p>I wouldn’t use a PC which isn’t mine to login to anything sensitive. A password in a leak isn’t evidence of anything.
评论 #43935112 未加载
评论 #43935119 未加载