DOGE Staffer Big Balls Secretly Helped Cybercrime Ring

A member of Elon Musk’s DOGE Service team is in trouble for helping cybercriminals. The team, called the Department of Government Efficiency (DOGE), was created to shrink the U.S. government. But records show that one of its top tech experts once worked with hackers.

A Young Tech Star with a Dark Past

The cybercrime group was involved in data theft, hacking, and harassing law enforcement. Despite this, the staffer later joined DOGE and gained access to sensitive government networks.

The staffer is only 19 years old. Elon Musk praised him on social media for his tech skills. Online, he goes by the nickname “Big Balls”. He was celebrated for his work with the DOGE team. But records show that two years earlier, he had ties to a dangerous cybercrime group.

Assisting Criminals While in High School

In 2022, while still in high school, Big Balls started a company called DiamondCDN. It offered network security services. This included protection against DDoS attacks—a type of hacking that floods websites with fake traffic. The company claimed to make websites faster and more secure.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

But records show that DiamondCDN had a cybercrime group as a customer. The group was called EGodly. They were involved in hacking, stealing data, and harassing an FBI agent.

Digital records show that EGodly thanked DiamondCDN for its services. In 2023, they posted a message on Telegram, a messaging app. The group praised DiamondCDN for its DDoS protection and caching systems. These services helped them keep their criminal website online.

Investigators found that DiamondCDN’s servers were linked to EGodly’s website. The site hosted stolen data. People visiting EGodly’s site often had to pass through DiamondCDN’s security checks. This proved that the criminal group was using the company’s services.

Massive Data Breach Hits Honda Cars India

EGodly’s Disturbing Activities

EGodly was not just a group of hackers. They were involved in stealing phone numbers and hacking government emails. They also stole cryptocurrency. On Telegram, they bragged about hacking law enforcement accounts in Latin America and Eastern Europe.

In a shocking attack, the gang targeted an FBI agent who was investigating them. They shared his personal information, including his phone number and photos of his home.

To scare him more, EGodly posted a prank call recording made to his phone. In another video, they drove by his house at night and shouted insults from the car.

The FBI agent, who has since retired, confirmed that EGodly was linked to swatting incidents—a dangerous prank where fake emergency calls are made to send armed police to someone’s home.

Cyberattack Hits Ukraine’s Railway, Causing Travel Disruptions

Government Access Raises Security Concerns

Despite his previous ties to this criminal group, Big Balls was later hired by Elon Musk’s DOGE Service team. This team was granted sweeping access to official government networks. Records show that the 19-year-old is listed as a “senior adviser” at both the State Department and the Cybersecurity and Infrastructure Security Agency (CISA).

CISA is the agency responsible for protecting government networks from cyberattacks. Yet, one of its own advisers had previously provided support to criminals who targeted law enforcement.

Neither Big Balls nor the DOGE team has responded to requests for comment. The State Department and CISA also declined to provide any information.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

The disturbing revelation raises serious questions about government security and background checks. Despite his young age and previous ties to a cybercrime group, Big Balls was given access to highly sensitive U.S. government systems.

Authorities have not confirmed whether EGodly is still active or if any legal action will be taken against Big Balls for his involvement. However, the exposure of his dark past has cast a shadow over Musk’s controversial government efficiency initiative.

 

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Slopsquatting Exploits Fake AI Suggestions to Spread Malware

What Is Slopsquatting? A new kind of cyber trick is...

XorDDoS Malware Now Strikes Docker and IoT Devices with Greater Force

Cybersecurity researchers have found new details about the dangerous...

MysterySnail Malware Strikes Again in Russia and Mongolia

A Sneaky New Cyber Weapon in Play A group of...

Agent Tesla Strikes Again with Hidden Scripts and Smart Tricks

A Sneaky New Malware Campaign Uncovered A newly discovered malware...

Dangerous Malware Ads on Facebook and TikTok Target Android Users

Scam Ads Lure Victims Through Social Media In Singapore, Android...

Schedule 1 Players at Risk from Malicious Mods

 What’s Happening With Schedule 1 Mods? Schedule 1 is a...

Wallet Theft Alert as Fake Python Tools Target Crypto Coders

A Dangerous Trick on Crypto Developers A recent cyberattack has...

Russia-Linked Hackers Use Fake Wine Event to Target European Diplomats

A Sneaky Cyber Trick Disguised as a Friendly Invitation A...

The Node.js Trap: When Safe Software Becomes a Cyber Threat

A Trusted Developer Tool Now in the Hands of...

Fake PDF Websites Are the New Trick in Online Scams

A Fake Tool That Looks Real A new threat is...

Slopsquatting Exploits Fake AI Suggestions to Spread Malware

What Is Slopsquatting? A new kind of cyber trick is...

XorDDoS Malware Now Strikes Docker and IoT Devices with Greater Force

Cybersecurity researchers have found new details about the dangerous...

MysterySnail Malware Strikes Again in Russia and Mongolia

A Sneaky New Cyber Weapon in Play A group of...

Agent Tesla Strikes Again with Hidden Scripts and Smart Tricks

A Sneaky New Malware Campaign Uncovered A newly discovered malware...

Dangerous Malware Ads on Facebook and TikTok Target Android Users

Scam Ads Lure Victims Through Social Media In Singapore, Android...

Schedule 1 Players at Risk from Malicious Mods

 What’s Happening With Schedule 1 Mods? Schedule 1 is a...

Wallet Theft Alert as Fake Python Tools Target Crypto Coders

A Dangerous Trick on Crypto Developers A recent cyberattack has...

Russia-Linked Hackers Use Fake Wine Event to Target European Diplomats

A Sneaky Cyber Trick Disguised as a Friendly Invitation A...

Related Articles

Popular Categories

error: Content is protected !!