Feds ID hacker who played AI video of Trump kissing Musk’s feet – and warn that ‘legal ramifications are being explored’

The feds have ID’d the cyberpunk who broadcast an AI-powered video of President Trump kissing the feet of Elon Musk on public TVs at HUD on Monday and are threatening to take legal action against them.

Officials at the Department of Housing and Urban Development said the individual has been identified, although they didn’t name them or reveal how the hacker managed to infiltrate the government television system in the cafeteria at the agency’s headquarters.

“Yesterday, an individual was escorted off the property,” a HUD rep told The Post on Tuesday. “Legal ramifications are being explored. Additionally, termination or suspension of certain services are being explored as it relates to the department.”

Workers at HUD were caught off guard when the disturbing rogue video was broadcast at department headquarters with the message: “LONG LIVE THE REAL KING.”

Keep reading

U.S. Sanctions Chinese Cybersecurity Firm Over Cyberattacks

US sanctions Beijing-based Integrity Technology Group for aiding “Flax Typhoon” hackers in cyberattacks on American infrastructure, freezing assets and banning US dealings.

The US Treasury Department has sanctioned Integrity Technology Group, a Beijing-based company, accusing it of involvement in cyberattacks against American infrastructure. The decision, announced on January 3, 2025, has escalated tensions between the US and China over cybersecurity issues.

What’s Behind the Sanctions?

Integrity Technology Group, also known as Yongxin Zhicheng Technology Group, is alleged to have worked closely with the Chinese state-sponsored hacking group “Flax Typhoon.” US officials claim the company played a key role in cyber activities targeting government systems, businesses, and critical infrastructure. Over 250,000 devices worldwide were reportedly compromised in these incidents.

The sanctions freeze the company’s assets in the US and prohibit American entities from doing business with it. By cutting off financial ties, the US aims to limit the group’s resources for continuing cyber operations.

Official Statements and Responses

The US government has stated that these actions are part of ongoing efforts to protect national security and hold cyber offenders accountable. Treasury Secretary Janet Yellen commented, “This sends a clear message to entities enabling malicious cyber activity: we will not tolerate these actions.”

China, however, has rejected the accusations. A spokesperson for the Chinese Foreign Ministry called the sanctions “baseless” and accused the US of deflecting blame for its own cybersecurity issues. Integrity Technology Group has denied the allegations, claiming it operates within legal bounds and condemning the sanctions as damaging to its reputation.

Keep reading

Massive healthcare breaches prompt US cybersecurity rules overhaul

The U.S. Department of Health and Human Services (HHS) has proposed updates to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to secure patients’ health data following a surge in massive healthcare data leaks.

These stricter cybersecurity rules, proposed by the HHS’ Office for Civil Rights (OCR) and expected to be published as a final rule within 60 days, would require healthcare organizations to encrypt protected health information (PHI), implement multifactor authentication, and segment their networks to make it harder for attackers to move laterally through them.

“In recent years, there has been an alarming growth in the number of breaches affecting 500 or more individuals reported to the Department, the overall number of individuals affected by such breaches, and the rampant escalation of cyberattacks using hacking and ransomware,” the HHS’ proposal says.

“The Department is concerned by the increasing numbers of breaches and other cybersecurity incidents experienced by regulated entities. We are also increasingly concerned by the upward trend in the numbers of individuals affected by such incidents and the magnitude of the potential harms from such incidents.”

Reuters reports that Anne Neuberger, the White House’s deputy national security adviser for cyber and emerging technologies, also told reporters that the HIPAA cybersecurity rule updates were prompted by the ransomware attacks and massive breaches that have affected hospitals and Americans in recent years.

Neuberger added that implementing these rules would cost roughly $9 billion in the first year and over $6 billion during the following four years.

Keep reading

U.S. Army Soldier Arrested for Allegedly Hacking Trump and Kamala Harris’s Phones, Selling “Confidential Phone Records” Online

U.S. Army soldier Cameron John Wagenius, 20, has been arrested and charged with unlawfully transferring confidential phone records.

Federal authorities accuse the young soldier of participating in a cybercriminal ring that sold sensitive data, including alleged phone records of President-elect Donald Trump and Kamala Harris, on the black market.

The indictment, unsealed this week, reveals two counts of unlawful transfer of confidential phone records filed against Wagenius, according to KrebsonSecurity.

The charges follow a December 20 arrest near Fort Hood, Texas, a base associated with Fort Cavazos where Wagenius was stationed.

Wagenius, described by his mother as a tech-savvy soldier, worked on network communications at an Army base in South Korea before returning stateside.

His mother, Alicia Roen, told cybersecurity journalist Brian Krebs, “I never was aware he was into hacking. It was definitely a shock to me when we found this stuff out.”

In a comment to Krebs website, Mrs. Roen wrote, “I am his mother and I am not an open book, I was asked general questions about my sons age and if he was a solider! That is all I said and Krebs already had this information. I never knew my son was involved in any of this or involved with others until I read Krebs 1st article following my sons arrest, which was all new news to me! Do you really think a child would ever tell his parents he was involved in criminal activity?”

Operating under the online alias “Kiberphant0m,” Wagenius is accused of participating in multiple high-profile data breaches. He allegedly sold confidential phone records on online forums in November, claiming to have hacked 15 telecommunications firms, including AT&T and Verizon.

In November, “Kiberphant0m” posted what were purported to be AT&T call logs for President-elect Trump and Vice President Harris, though the authenticity of these records has not been confirmed.

The arrest follows an investigation into a series of data breaches affecting numerous organizations. Wagenius’s alleged accomplices include Canadian national Connor Riley Moucka, known online as “Judische,” who was arrested in late October, and John Binns, currently detained in Turkey.

These individuals are suspected of involvement in the theft and extortion of data from customers of the cloud service Snowflake, among other targets.

Keep reading

Concerns over the Security of Electronic Personal Health Information Intensifies

On Friday, an attorney for Ascension Health, a major U.S. hospital operator, wrote to Maine’s attorney general to tell him the electronic personal health information (e-PHI) of Ascension patients and employees were compromised during the ransomware attack that occurred in May that affected nearly 5.6 million people.

The attack significantly disrupted Ascension’s operations across its extensive network, encompassing 134,000 associates, 35,000 affiliated providers, and 140 hospitals in 19 states and the District of Columbia. Immediate consequences included the diversion of ambulances, closure of pharmacies, and a reversion to manual record-keeping methods as critical IT systems had to be taken offline.

Ascension attorney Sunil Shenoi said in his December 19 letter to the Maine Attorney General’s Consumer Protection Division that the company “will begin notifying applicable Maine residents of the security incident” through the U.S. Postal Service.

Despite the growing scale of cyber threats against the healthcare industry, a Congressional Research Service (CRS) report earlier this month emphasized that “there is no comprehensive digital data protection law in the United States.” Variable state data privacy and security laws compound this problem. Furthermore, while many data protection guidance documents are available, they are voluntary.

The attack on Ascension is the latest cyber-attack targeting the healthcare sector, which is particularly vulnerable due to the sensitive nature of patient data and the critical importance of uninterrupted medical services. Earlier this year there was a similar ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group that affected the personal health information of 100 million people, underscoring once again the escalating cybersecurity challenges healthcare providers face.

The February ransomware attack on Change Healthcare – attributed to the BlackCat cybercrime group – disrupted electronic payments and medical claims processing affecting healthcare providers and patients nationwide.

Keep reading

Pentagon Sparks Social Media Uproar After Posting a Bewildering Message on its Website as Suspicious Drones Invade America

The Pentagon on Friday once again illustrated we do not have the best and brightest leading us, as suspicious drones invade sensitive areas across America and on military bases.

As Jim Hoft previously reported, several mysterious drones were spotted flying over New Jersey last week. The drones were spotted over at least 12 counties, prompting mayors to contact the governor and demand answers.

This has raised alarm bells across America, with suspicion a foreign adversary is responsible. Rep. Jeff Van Drew (R-NJ) claimed on Wednesday that he had sources that Iran is responsible.

“I learned from very high sources, from very qualified sources, Iran launched a mothership a month ago that contains these drones, Van Drew said. “It’s off the east coast of the United States.”

It’s not just New Jersey either. Former Maryland Governor Larry Hogan revealed on Friday that he had personally witnessed several drones over his residence in recent days.

There have also been drone sightings over U.S. Military bases.

The Department of Defense’s dismissive response to these alarming sightings has only inspired anger, mockery, and confusion. Then, on Friday, the agency sent out a so-called “test” message on its website that only raised eyebrows further.

The best way to describe the text is complete utter gibberish.

Keep reading

Chinese Hack Means Beijing Reading and Hearing All US Military and Intelligence Classified Phone Communications

There has been some limited press coverage about recent Salt Typhoon — a Chinese cyber / hacking operation — but most Americans are oblivious about what has transpired. The story is simple. Following Edward Snowden’s escape to Russia and the release of damning evidence that the US Government was spying on Americans, the US Department of Justice pressured the telecommunications giants — i.e., Verizon, ATT and T-Mobile — to create a backdoor in their network software that allows Federal law enforcement to read texts and listen to calls on classified apps. If you are using WhatsApp and think you are safe from the government’s spying eyes, think again.

Sometime before the November 5 Presidential election, the US intelligence community discovered (or learned?) that the Chinese had hacked the “backdoor” and have had full access to all US Government-issued cell phones that use a classified app for text and voice communications. A knowledgeable source told me that the compromise started in 2022 and was only recently discovered.

What does this mean? All conversations / communications over the commercial networks are (or were) being read / recorded by China. My source described the Chinese hack as something akin to the Brits, with help from Polish and American cryptologists, breaking the Enigma machine and reading classified German military traffic.

Keep reading

Chinese Hackers Breach US Telecoms Network

Chinese hackers have breached the US telecoms network and appear to have targeted Donald Trump and his running-mate JD Vance.

In a joint statement issued on Friday, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) said they are “aggressively” investigating and attempting to mitigate a breach linked to the Chinese Communist Party.

“Agencies across the U.S. Government are collaborating to aggressively mitigate this threat and are coordinating with our industry partners to strengthen cyber defenses across the commercial communications sector,” CISA and the FBI stated.

The two agencies said that affected companies have been notified and provided with technical assistance.

No group has yet come forward to claim responsibility for the attack, and specific details of its nature have not been made public.

In response to reports that Donald Trump and JD Vance may have been targets of this latest hack, Trump campaign spokesman Steven Cheung issued a statement.

“This is the continuation of election interference by Kamala Harris and Democrats who will stop at nothing, including emboldening China and Iran attacking critical American infrastructure, to prevent President Trump from returning to the White House,“ Cheung told The Epoch Times.

”Their dangerous and violent rhetoric has given permission to those who wish to harm President Trump.”

Keep reading

BOMBSHELL: Iranian Hackers Broke Into State’s Voter Roll Database – Used Names, SS and Driver’s License #’s to Fill Out UOCAVA Registrations – Shared Video of Their Actions Online!

On Monday, Jim Hoft, Editor and Publisher of The Gateway Pundit, and The Gateway Pundit Investigative Journalist Patty McMurray sat down with UOCAVA Expert and Professional Investigator Heather Honey.

** You can watch the interview here.

During our interview, we discussed the potential risks of allowing non-military, overseas voters to vote in our elections without having to prove their identity or even their citizenship in many cases.

Recently, the potential Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA) crisis came to our attention when Democrats began telegraphing that overseas voters could be the key in 2024 to winning and perhaps even overturning the election results one week or more AFTER the election.

As reported earlier by Patty McMurray, the DNC’s stated goal of winning the votes of approximately 9 million Americans through its Democrats Abroad website seems impossible, given that according to a recent report by the federal government FVAP website, only 4.4 million US citizens reside overseas, and only 2.8 million of those are of voting age.

Reuters recently wrote about the DNC’s plan to spend $300,000 to register “9 million” UOCAVA voters leading up to the 2024 election. According to the government website FVAP, there are only 2.8 million eligible UOCAVA voters. Let’s assume that half of those eligible voters would vote Democrat (a generous assumption given the state of the US economy); that’s only 1.4 million eligible voters in the 2024 election. The 1.4 million number doesn’t account for how they would vote or even if they would vote, given that a meager number of eligible overseas voters actually vote.

Curiously, the DNC memo claims that “over 1.6 million Americans from the battleground states of Arizona, Georgia, Michigan, Nevada, North Carolina, Pennsylvania, and Wisconsin” live overseas, adding that they plan to “fight for every vote.”

Keep reading

Chinese Hackers Used U.S. Government-Mandated Wiretap Systems

For as long as law enforcement has sought a way to monitor people’s conversations—though they’d only do so with a court order, we’re supposed to believe—privacy experts have warned that building backdoors into communications systems to ease government snooping is dangerous. A recent Chinese incursion into U.S. internet providers using infrastructure created to allow police easy wiretap access offers evidence, and not for the first time, that weakening security for anybody weakens it for everybody.

“A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests,” The Wall Street Journal reported last week. “For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data.”

Among the companies breached by the hacker group, dubbed “Salt Typhoon” by investigators, are Verizon, AT&T, and Lumen Technologies. The group is just one of several linked to the Chinese government that has targeted data and communications systems in the West.

While the Journal report doesn’t specify, Joe Mullin and Cindy Cohn of the Electronic Frontier Foundation (EFF) believe the wiretap-ready systems penetrated by the Chinese hackers were “likely created to facilitate smooth compliance with wrong-headed laws like CALEA.” CALEA, known in full as the Communications Assistance for Law Enforcement Act, dates back to 1994 and “forced telephone companies to redesign their network architectures to make it easier for law enforcement to wiretap digital telephone calls,” according to an EFF guide to the law. A decade later it was expanded to encompass internet service providers, who were targeted by Salt Typhoon.

“That’s right,” comment Mullin and Cohn. “The path for law enforcement access set up by these companies was apparently compromised and used by China-backed hackers.”

Keep reading