Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

erronis

(19,184 posts)
Wed Apr 23, 2025, 06:25 PM Wednesday

DOGE Worker's Code Supports NLRB Whistleblower -- Brian Krebs

https://krebsonsecurity.com/2025/04/doge-workers-code-supports-nlrb-whistleblower/

Lots of technical details in Brian's post. Basically this supports the accusation that Musk's doge boys were subverting internal systems to support exfiltration of data without security controls.

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk’s Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency’s sensitive case files in early March. The whistleblower said accounts created for DOGE at the NLRB downloaded three code repositories from GitHub. Further investigation into one of those code bundles shows it is remarkably similar to a program published in January 2025 by Marko Elez, a 25-year-old DOGE employee who has worked at a number of Musk’s companies.

According to a whistleblower complaint filed last week by Daniel J. Berulis, a 38-year-old security architect at the NLRB, officials from DOGE met with NLRB leaders on March 3 and demanded the creation of several all-powerful “tenant admin” accounts that were to be exempted from network logging activity that would otherwise keep a detailed record of all actions taken by those accounts.

Berulis said the new DOGE accounts had unrestricted permission to read, copy, and alter information contained in NLRB databases. The new accounts also could restrict log visibility, delay retention, route logs elsewhere, or even remove them entirely — top-tier user privileges that neither Berulis nor his boss possessed.

Berulis said he discovered one of the DOGE accounts had downloaded three external code libraries from GitHub that neither NLRB nor its contractors ever used. A “readme” file in one of the code bundles explained it was created to rotate connections through a large pool of cloud Internet addresses that serve “as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.” Brute force attacks involve automated login attempts that try many credential combinations in rapid sequence.

. . .
1 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
DOGE Worker's Code Supports NLRB Whistleblower -- Brian Krebs (Original Post) erronis Wednesday OP
In any other dimension, this would be very pertinent. dchill Wednesday #1

dchill

(42,106 posts)
1. In any other dimension, this would be very pertinent.
Wed Apr 23, 2025, 06:31 PM
Wednesday

Anyone who deals in stolen data should be quickly arrested and charged. I don't give a Trump who you are.

Latest Discussions»General Discussion»DOGE Worker's Code Suppor...