• @[email protected]
    link
    fedilink
    English
    31
    edit-2
    5 days ago

    The second part of the article states that the stealer logs he’s shown up in only come from computers infected with malware. And it’s possible, even more likely than not, that he used this personal computer for government work.

    • @[email protected]
      link
      fedilink
      English
      1
      edit-2
      5 days ago

      The topic is more nuanced, all the logs indicate email/password combos that were compromised.

      While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no “malware” was installed.

      The point being it doesn’t look great that someone has ANY compromises… But again, anyone who’s used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you’ll often be notified of all your potentially compromised accounts.