DOGE bro Kyle Schutt's computer infected by malware, credentials found in stealer logs https://micahflee.com/doge-bro-kyle-schutts-computer-infected-by-malware-credentials-found-in-stealer-logs/
DOGE bro Kyle Schutt's computer infected by malware, credentials found in stealer logs

Kyle Schutt is a 37 year old "DOGE software engineer," according to ProPublica. In February, Drop Site News reported that he gained access to FEMA's "core financial management system." His computer was apparently compromised with malware, because his email address and passwords have shown up in four separate stealer log

micahflee

@micahflee At this point it's difficult not to suspect their awful OpSec is a choice, and that there are specific people (*ahem* *cough cough* the Russians *cough*) to whom they're leaking secrets, with incompetence being merely plausible deniability for their true, treasonous agenda.

That line in Hegseth's office, for example, wasn't installed by Comcast, was it? Only DOGE and Starlink, with direct authorization of Putin's puppet in the White House, could have bypassed all security measures.

@micahflee still more for the Incompetence or Malice files.

Or of course "why not both?"

@micahflee DOGE really does hire the best

/s

@micahflee MUCH FAIL.
SO INCOMPETENT.
@micahflee OH WOW, SO MUSK, MUCH PUTIN, OH WOW.

@micahflee The NLRB whistleblower case has another documented instance where login attempts were observed within fifteen minutes of new account creation from a foreign IP address. Iโ€™m willing to bet itโ€™s another DOGE clown with a infostealer on their host.

https://www.npr.org/2025/04/15/nx-s1-5355895/doge-musk-nlrb-takeaways-security

There's an article circulating that claims Kyle Schutt from Elon's DOGEโ€ฆ | Alon Gal

There's an article circulating that claims Kyle Schutt from Elon's DOGE team was infected with Infostealer malware. I checked the data myself, and this is not true. Kyle's email does appear in an Infostealer log, but only because someone else whose computer was actually infected, had one of Kyle's login credentials saved in their browser. This often happens when someone hacks an account by brute-forcing popular services and the browser automatically saves the credentials. The image from Hudson Rock's platform shows Kyle's email associated with credentials for Torguard.net. These credentials were brute-forced by the individual whose device was compromised. This is a very common scenario and does not indicate any negligence or compromise on Kyleโ€™s part. The author of the original article admittedly says "I don't know nearly enough about the origins of these stealer log datasets." and if I found the article on time I wouldn't "shame" them but since the article has been picked up and is currently going viral, I figured I'll make it clear that Kyle Schutt was in fact not infected by malware. Original article - https://lnkd.in/diznSHzA

@micahflee One by one, crypto bros realise the value in the regulations that require financial institutions to be able to roll back fraudulent transactions.

@david_chisnall @micahflee do we know for sure whether this particular DOGE bro is also a crypto bro? i've been able to confirm Cole Killian as a bro and have seen confirmation of at least one of the others, but not Kyle Schutt (yet)

https://cryptadamus.substack.com/p/the-crypto-grifters-of-doge

The Crypto Grifters Of DOGE

How many crypto grifters does it take to screw up the machinery of state?

The Cryptocalypse Chronicles