The White House has conducted investigations following reports that one or more individuals accessed the contacts on the personal phone of White House chief of staff Susie Wiles.
The information was allegedly used to impersonate Wiles and contact other high-ranking officials.
According to reports, Wiles informed individuals that her phone had been compromised.
The Wall Street Journal was the first to disclose the breach of Wiles’ phone. The reporting was also verified by CBS News.
It is alleged that the hacker or hackers have accessed Wiles’ phone contacts, which include the phone numbers of other prominent U.S. officials and influential individuals.
The Wall Street Journal reports that certain contacts received phone calls impersonating Wiles, which utilized artificial intelligence to imitate her voice and sent text messages from a number that was not associated with Wiles.
When asked by the media, White House spokesperson Anna Kelly declined to disclose whether authorities had identified whether a cloud account associated with Wiles’ personal device was compromised or whether Wiles’ phone was the target of a more sophisticated cyberattack, such as one that employed government-grade spyware.
The White House responded by stating that it “takes the cybersecurity of all staff very seriously” and that the matter is still being investigated.
Hackers have targeted Wiles for the second time. In 2024, The Washington Post reported that Iranian hackers had attempted to compromise Wiles’ personal email account.
The Journal reported previously that the hackers were successful in accessing her email and obtaining a dossier on Vice President JD Vance, who was then Trump’s running mate, according to sources.
This is the most recent cybersecurity incident to affect the Trump administration in the months following its inauguration.
In March, Michael Waltz, the former White House top national security adviser, inadvertently included a journalist in a Signal group of senior White House officials, including Vance and Wiles.
The group was involved in discussions regarding a planned military airstrike in Yemen.
Subsequently, media reports disclosed that the government officials were employing TeleMessage, a Signal clone application that was intended to retain a duplicate of communications for government archiving.
TeleMessage was subsequently compromised on at least two occasions, disclosing the contents of its users’ confidential messages.