A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign

For years, a A mysterious personality that passes through the Sterin handle led the Trickbot Ransomware gang and escaped from identity – even when other members of the group were overcome in leaks and unconvincing leaks. The German authorities have revealed this week, without a lot of noise, who believe that the mysterious ampllows are: Vitaly Nikolaevich Kovalev, a 36 -year -old Russian man who remains in his country.
Closer to the home, WIRED has revealed that customs protection and borders have 133,000 migrant children and adolescents to collect their DNA and download their genetic data to a national criminal database used by local, state and federal law enforcement. As the Trump administration’s migratory management campaign is often justified by crime and terrorism calls, WIRED also discovered evidence that it links the Mixed Swedish Swedish Championship in the military hole to the new American “fighting club” in California.
For those who seek to evade US government control, we have provided advice on more special alternatives to browsing the web, email and US -based search tools. We collected a more general guide to protect yourself from monitoring and piracy, based on the questions that the writer Matt Burgis received in Radet, ask me anything.
But this is not all. Every week, we link the security and privacy news that we did not cover deeply. Click the titles to read full stories. And staying safe there.
The Wall Street Journal reported that the FBI investigates those who impersonate Suzy Wales, the Chief of Staff of the White House in Trump and one of the closest advisers of the president, in a series of fraudulent messages and calls to prominent republican political figures and business executives. Government officials and authorities participating in the investigation say that spear messages and calls have targeted individuals in the Wiles call list, and WILES told colleagues that her personal phone had been hacked to reach these connections.
Although Wales’s claim that she had penetrated her devices, it is still certain whether this is actually how attackers have identified Wiles partners. It will also be possible to assemble this target menu from a set of information and data available to the public sold by gray market brokers.
“It is an embarrassing level of security awareness. You cannot convince me that they have already done their security training,” says Jake Williams, a former National Security Agency and Vice President of Research and Development in the Hunter Strategy. “This is the various social engineering type in the garden that everyone can eventually deal with these days, and certainly senior government officials should expect it.”
In some cases, the goals not only received text messages, but the phone calls that committed suicide with Wales’s voice, and some government officials believe that calls may have used the artificial intelligence tools of Wales’s fake voice. If so, this would make the accident one of the most important cases so far for the so -called Deepfake programs used to try to hunt.
It was not yet clear how the Wales phone had been hacked, but the FBI excluded the involvement of a foreign nation in the personal plagiarization campaign, according to White House officials. In fact, although some personal impersonation attempts have political goals – a member of congress, for example, was asked to collect a list of people who may be forgiven by Trump – in at least one case, attempted suicide to deceive a goal for a cash transfer. This attempt to seize the money indicates that the deception campaign may be less than the spying process than the online fraud in operating the party, although it has a high -level goal.
Don’t miss more hot News like this! Click here to discover the latest in Technology news!
2025-05-30 18:42:00