• sem@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    1
    ·
    edit-2
    19 hours ago

    The second part of the article states that the stealer logs he’s shown up in only come from computers infected with malware. And it’s possible, even more likely than not, that he used this personal computer for government work.

    • pureness@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      4
      ·
      edit-2
      18 hours ago

      The topic is more nuanced, all the logs indicate email/password combos that were compromised.

      While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no “malware” was installed.

      The point being it doesn’t look great that someone has ANY compromises… But again, anyone who’s used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you’ll often be notified of all your potentially compromised accounts.