We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode July 2nd, 2025: Iranian Hackers Claim They've Breached Trump’s Inner Circle & Hamas Bounties On Aid Workers

July 2nd, 2025: Iranian Hackers Claim They've Breached Trump’s Inner Circle & Hamas Bounties On Aid Workers

2025/7/2
logo of podcast The President's Daily Brief

The President's Daily Brief

AI Chapters Transcript
Chapters
An Iran-linked hacking group, calling themselves Robert, claims to have breached Trump's inner circle and threatens to release stolen emails. The emails reportedly include communications from high-profile individuals, and the timing suggests a potential retaliation for recent events. US authorities responded, calling it a smear campaign.
  • Iran-linked hacker group 'Robert' claims breach of Trump's inner circle
  • Threat to release 100GB of emails from White House officials
  • Emails reportedly include communications from Susie Wiles, Roger Stone, Lindsey Halligan, and Stormy Daniels
  • US Cybersecurity and Infrastructure Security Agency calls it a smear campaign

Shownotes Transcript

Running a business comes with a lot of what-ifs. But luckily, there's a simple answer to them. Shopify. It's the commerce platform behind millions of businesses, including Thrive Cosmetics and Momofuku. And it'll help you with everything you need. From website design and marketing to boosting sales and expanding operations, Shopify can get the job done and make your dream a reality. Turn those what-ifs into... Sign up for your $1 per month trial at shopify.com slash special offer.

Looking to diversify your hard-earned assets? Well, schedule a free consultation with Birch Gold Group. They are the precious metals specialist. Just text PDB to the number 989-898 and you'll receive a free no-obligation information kit and learn how to convert an existing IRA or a 401k to a gold IRA. That's PDB to the number 989-898.

It's Wednesday, the 2nd of July. Welcome to the President's Daily Brief. I'm Mike Baker, your eyes and ears on the world stage. All right, let's get briefed. We'll start things off with a new claim from an Iran-backed hacking group. Now, they say they've breached Trump's inner circle and they're threatening to leak the emails, which is odd if you think about it. I mean, why wouldn't they just release the emails rather than threaten to? Hmm.

Later in the show, reports from a Gaza-based aid group that say Hamas is putting bounties on the heads of humanitarian workers, including Americans. Well, I mean, it is Hamas, so a total of no one should be surprised. Plus, more ugly cartel violence in Mexico. Authorities discover 20 bodies, some decapitated, in a region torn apart by infighting within the Sinaloa cartel.

And in today's Back of the Brief, North Korea's latest scheme, or scam, to dodge sanctions. U.S. official Sae Pyongyang planted fake IT workers inside major American companies to funnel money back to the regime. But first, today's PDB Spotlight.

While a U.S.-brokered ceasefire may be holding between Israel and Iran, agents of the Iranian regime are upping their threats against the Trump administration over the recent bombing operation targeting their nuclear facilities. An Iranian-linked cyber attack group that previously hacked into Trump's presidential campaign last year said that they have roughly 100 gigabytes of emails from senior officials in the White House and are threatening to publicly release the stolen communications.

The hacking group, which goes by the pseudonym Robert. Seriously, it's an evil hacking group linked to the Iranian regime, and they decided to name themselves Robert. Makes you wonder how many meetings they had to hold to come up with that decision. Anyway, Robert first reached out to Reuters on Sunday, and again on Monday, telling the outlet that they were organizing a sale of the stolen emails, though they didn't elaborate on their plans.

The trove of emails reportedly include the private communications of White House Chief of Staff Susie Wiles, Trump confidant Roger Stone, Trump lawyer Lindsey Halligan, and porn star Stormy Daniels. Because, well, that's what we needed. More Stormy Daniels. Now, it's unclear if the emails are part of the same batch of documents stolen during last year's hack, or if the group has engaged in more recent cyber breaches.

But the threat came just days after President Trump halted plans to potentially ease sanctions on the Iranians, after Supreme Leader Ayatollah Ali Khamenei issued an antagonistic statement late last week, bizarrely declaring victory over the U.S. and Israel.

The U.S. Cybersecurity and Infrastructure Security Agency was quick to respond to the latest threat from the hackers, saying, quote, this so-called cyber attack is nothing more than digital propaganda and the targets are no coincidence. This is a calculated smear campaign meant to damage President Trump and discredit honorable public servants, end quote.

Now, as our longtime listeners will recall, this hacking group, which is linked to Iran's Islamic Revolutionary Guard Corps, the IRGC, managed to breach the Trump campaign last June through a phishing email that targeted Roger Stone and others. They successfully stole internal campaign documents, including a vetting document prepared on Vice President J.D. Vance. The Iranian hackers later distributed some of the stolen documents to American media outlets,

and members of the Harris campaign in an attempt to tip the scales of the U.S. presidential election. Subsequent hacks late last year also targeted Trump lawyer Lindsey Halligan and FBI Director Kash Patel, though no documents were leaked as part of those breaches. In late September, the Department of Justice charged three Iranian cyber operatives allegedly employed by the IRGC in relation to the hack-and-leak operation, accusing the trio of attempting to sabotage the presidential election.

But after Trump's re-election last November, it appeared the hackers had decided to sit on their trove of stolen emails, telling Reuters at the time that they had no plans for further leaks. As recently as May, the hackers told Reuters they had, quote, retired, but their calculus appears to have changed in the wake of Iran's recent humiliation at the hands of Israel and the U.S. There are renewed threats.

came the same day that the U.S. Cybersecurity Agency issued a public bulletin warning that Iran-linked cybergroups are likely to engage in attacks on critical infrastructure systems in the U.S., such as utilities, transportation, and economic hubs. The bulletin also warned that they could target senior American officials, defense contractors, and American companies with ties to Israel.

Now, national security officials say the battered Iranian regime is looking for non-military ways to exact revenge on the U.S. over the strikes on their nuclear sites. Regarding the latest threat, an analyst on Iranian cyber espionage at the American Enterprise Institute told us,

told Reuters, quote, a default explanation is that everyone's been ordered to use all the asymmetric stuff that they can that's not likely to trigger a resumption of major Israeli-U.S. military activity. Leaking a bunch more emails is not likely to do that, end quote.

Okay, turning our attention slightly to the status of Iran's nuclear sites, while we still don't have an official damage assessment, it appears the Iranians are already working to access their facilities. New satellite images released by U.S. defense contractor Maxar Technologies reveal renewed activity outside the Fordow nuclear enrichment plant. The images show an excavator and several personnel working near the northern shaft on the ridge above the underground complex.

Other images show several vehicles parked along a path built in recent days to access the site. The team appears to be backfilling the craters made by the bunker buster bombs dropped on the site, but there's no indication that they have been able to reopen any of the tunnel entrances.

As a reminder, uncertainty remains over just how much damage the U.S. strikes dealt to Iran's capabilities. While the Trump administration says the sites were totally obliterated, the head of the U.N.'s nuclear watchdog said Sunday that the strikes failed to completely destroy the facilities and that Iran could likely restart their enrichment program within a matter of months.

All right. After the break, Hamas is being accused of placing bounties on the heads of aid workers. And Mexican authorities uncover 20 mutilated bodies in a region rocked by Sinaloa cartel infighting. I'll be right back.

Hey, Mike Baker here. I want to tell you about a great clothing company out there that's producing outstanding gear. Now, it's called True Classic. True Classic goes beyond fit and fabric. Their primary mission, well, is to help men show up with confidence and purpose. And you want both of those things, confidence and purpose. Their clothing is designed to fit well, feel great, and stay affordable so men can look sharp without overspending. And that's obviously important. And what really sets True Classic apart is the intention behind the brand.

Now, from supporting underserved communities to helping men feel more confident in their daily lives and even bringing humor to their messaging, they lead with purpose. Each piece is tailored where it matters and relaxed where it counts, offering a clean, comfortable fit that works for everyday life. There's no stiff fabric. You don't want that. There's no bunching. You definitely don't want bunching. Just dependable quality and design. Say goodbye to overpriced designer labels and throwaway fast fashion.

True Classic is built for comfort, built to last, and built to give back. You can find them at Target, at Costco, or just visit trueclassic.com slash pdb to learn more and explore their collection.

This episode is brought to you by Progressive Insurance. Do you ever find yourself playing the budgeting game? Well, with the Name Your Price tool from Progressive, you can find options that fit your budget and potentially lower your bills. Try it at Progressive.com. Progressive Casualty Insurance Company and Affiliates. Price and coverage match limited by state law. Not available in all states.

Welcome back to the PDB. I want to return to a story that we've been keeping a close eye on here at the PDB, and that's the ongoing fight over humanitarian aid inside Gaza. At the center of that fight is a group called the Gaza Humanitarian Foundation, or GHF. Now, this is the controversial U.S. and Israeli-backed nonprofit that's taken over much of the aid distribution inside the Gaza Strip, and it's a group that's been fighting for a long time.

that's become a direct threat to Hamas. Because as we've noted, the GHF bypasses the traditional international aid channels like those run through the UN. And those are channels that Hamas has historically used to maintain control over food and medicine and basic supplies, thus maintaining control and leverage over the population of Gaza. But the GHF changes that equation. It delivers food and water and supplies directly to Palestinians, bypassing Hamas.

And that has made the GHF a target. Late last month, the GHF released a statement in which it acknowledged that Hamas is now placing actual bounties on its aid workers, including Americans. The statement read, quote, We are aware of credible reports that Hamas is openly targeting the Gaza Humanitarian Foundation and those who work with us. According to these reports, Hamas has placed bounties on both our American security personnel and Palestinian aid workers.

offering cash rewards to anyone who injures or kills them." The GHF also accused Hamas of deploying armed operatives near humanitarian aid zones in an attempt to disrupt operations and intimidate workers. In the same statement, the group revealed the human cost of their mission. "Our local staff who keep these operations running have already paid the ultimate price: 12 murdered, others tortured, and now more threats emerging by the day."

But even as Hamas tries to tear down the GHF from inside Gaza, criticism is mounting from the outside as well. Roughly 170 humanitarian groups and charities from around the world have now called for the GHF to pull out of Gaza entirely. Yes, because you certainly wouldn't want a group in there that's actually distributing aid. This week, they issued a joint statement that accused Israeli and allied forces of, quote, "...routinely opening fire on Palestinians trying to access aid."

So far, of course, the only reports of this, quote, routine fire, well, come from the Hamas-controlled health ministry. And as we've seen over the past year and a half, there is an endless supply of media outlets willing to be spoon-fed whatever narrative Hamas tosses out, and apparently, an endless supply of gormless consumers of media willing to believe anything they read or hear.

Now, the list of signatories includes major international players, Oxfam, Amnesty International, Save the Children. They allege that more than 500 Palestinians have been killed and nearly 4,000 injured in under a month while attempting to either receive or distribute humanitarian aid. Their statement reads, quote, End quote. Now,

You ask yourself, are those numbers and allegations accurate? Well, that depends on the source. As mentioned, many of the claims about Israeli troops firing on aid seekers come from Hamas-controlled Gaza health ministry personnel, and reports are often, as you might imagine, difficult to verify. Video evidence has been rare, and Israel maintains that most of these reports are largely bogus. The

The GHF, for its part, strongly denies that its own distribution zones are unsafe. They argue that attacks are happening in surrounding areas, and often because Hamas is intentionally drawing fire into those zones. Meanwhile, Israeli officials admit some troops have fired warning shots near aid sites, but say they're investigating reported incidents. They've also turned the blame back on Hamas, accusing the group of firing on its own people and then blaming the IDF.

So, as both the humanitarian situation and the information war rage on in Gaza, the GHF remains a flashpoint. One group says it's saving lives. The other side calls it a front for military control. One thing, though, is clear. Any group that works to deliver aid directly to the citizens of Gaza, thus bypassing Hamas and taking away their leverage and control over aid distribution, risk drawing fire, both figuratively and literally.

All right, turning now to Mexico. Authorities have discovered 20 mutilated bodies this week in an unmistakable sign of the escalating internal war between factions of the Sinaloa cartel. Among the dead were four decapitated corpses dumped on a highway bridge and 16 more bodies packed inside an abandoned vehicle. A bag at the scene,

contained five human heads. According to local Mexican media, several of the headless corpses had been strung upside down from the bridge by their legs. That's a macabre tactic long employed by cartels to terrorize the public and project dominance, though this particular detail for this occasion has not been confirmed yet by prosecutors. A written message was also reportedly left at the scene, apparently signed by one of the warring factions. As of now, its contents remain undisclosed.

The Sinaloa state prosecutor's office confirmed all 20 victims had gunshot wounds. In a statement later in the day, a Sinaloa state government spokesman condemned the killings, well, that's good, calling for a re-evaluation of Mexico's current security strategy. Yeah, well, that could be a good idea. His statement read, quote, military and police forces are working together to re-establish total peace in Sinaloa.

Now, the massacre comes amid intensifying bloodshed between rival wings of the Sinaloa cartel. That's a once-unified drug-trafficking empire that's now split. The fracture follows last year's high-profile U.S. capture of the cartel's co-founder, Ismael Zambada, who goes by the name El Mayo.

Zambada claims he was abducted in Mexico by operatives loyal to Joaquin El Chapo Guzman's sons, collectively known as Los Chapitos, and forcibly handed over to U.S. authorities. That abduction lit a match beneath an already unstable hierarchy, triggering a wave of retaliatory killings between factions loyal to Zambada and those aligned with the Chapitos.

Some of our PDB listeners may recall that Los Chapitos were the subject of a sweeping U.S. Justice Department indictment in 2023, which accused them of brutal violence. That indictment cited Chapitos feeding victims both dead and alive to pet tigers, torture via corkscrews and electric shocks, and raw chili peppers used as weapons of pain. U.S. prosecutors said the faction not only used brutality as a tool, but glorified it.

So far, the feud has left more than 1,200 people dead in Sinaloa alone. That's according to Mexican government figures. Nationwide, now listen to this, nationwide cartel violence in Mexico has claimed nearly a half million lives and left over 120,000 others missing since 2006.

Back in February, President Trump formally designated the Sinaloa cartel a foreign terrorist organization. That expands the legal toolkit available to U.S. law enforcement and intelligence agencies targeting cartel networks and their financial operations at home and abroad. But still, in recent months, corpses have become a form of messaging between the Chapitos and Zimbabwe's old guard loyalists. Bodies have been theatrically staged, holding pizza boxes or draped in sombreros or

stabbed with kitchen knives, symbols now associated with the warring factions as part performative art and part warning. All right, coming up next in the back of the brief, a massive fraud scheme brought to you by Kim Jong-un's North Korean regime. North Korean operatives posing as remote IT workers infiltrated Fortune 500 firms and sent their profits back to Kim. I'll have those details next.

Hey, Mike Baker here. Well, one of America's greatest holidays, of course, I'm talking about the 4th of July, is almost here. It's true. It's right around the corner. And this Independence Day, do your family and friends a favor, right? Fire up that grill, by all means, get that grill fired up. But when you do, declare your freedom from just average grocery store beef. You want the best beef for that grill, right? So you got to make it Tritail's. Look, Tritail's Beef is a real Texas family-run ranch, not some corporate meat factory.

They raise pasture-raised, grain-finished, black Angus cattle, and they ship it straight from their ranch to your front door. It's that simple. There's no middlemen. There's no shrink-wrapped nonsense. Just real American beef from folks who still believe in doing things the right way. And right now, when you order their Freedom Box, they'll throw in a free ribeye. Look, it's free.

It's officially grilling season. Do it right with Tri-Tales Beef. Go to tribeef.com slash pdb. That's tribeef.com slash pdb. Tri-Tales, because you and your family deserve the best.

Lowe's knows you don't want to sacrifice reliability for savings. This July 4th, get up to 40% off select LG appliances and purchase two or three select major appliances to get an additional 10% off. Save big on LG, America's most reliable line of home appliances at Lowe's. Based on independent reliability surveys 2021 to 2024 and select major appliances as compared to competing manufacturers offering full appliance lines. See associate for more details. Selection varies by location. While supplies last, exclusions apply. Valid 618-79.

Anyone

Anyone can deliver you headlines. Only the New York Post can deliver the headlines you need and the stories you want. From the iconic newsroom that pulls no punches comes the New York Post cast. Every weekday morning, I'll break down a headline impacting your world with sharp insight, context, and in-depth reporting. Plus, I'll have the Post's signature mix of stories that people are actually talking about, from politics to business to pop culture and everything in between.

This isn't just another news podcast. It's a look at what matters and a peek at what's too interesting to ignore, keeping you informed and entertained. I'm Caitlin Becker. Listen and subscribe to the New York Postcast every weekday morning on Apple Podcasts, Spotify, Amazon Music, or wherever you get your podcasts.

In today's Back of the Brief, we turn to North Korea, which is getting more creative in their attempts to illicitly fund their weapons program and regime, deploying an army of IT operatives to steal from U.S. Fortune 500 companies and defense contractors. The Department of Justice unveiled indictments on Monday against nine North Korean agents, including one residing in New Jersey, in connection with a sprawling cyber espionage network

used to infiltrate and defraud U.S. companies by using stolen identities to pose as remote IT workers. Between 2021 and 2024, their operatives were able to use compromised identities of more than 80 U.S. citizens to gain roles at more than 100 U.S. companies. These operatives then used their access to generate millions of dollars in revenue that was funneled back into the hermit kingdom.

In a statement, U.S. Attorney Leah Foley said, "...the threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies."

Now, as a result of their operations, the victim companies incurred significant legal fees, computer network remediation costs, and a variety of other damages and losses. According to the DOJ's criminal complaint, North Korea relied on at least four U.S.-based facilitators who partnered with overseas IT workers to create front companies and fake websites to promote the legitimacy of the regime's army of remote workers.

They then procured company computers and set up US-based laptop farms that allowed IT operatives in North Korea to remotely access the devices, making it look like they were working from inside the US. They also set up a number of financial accounts to receive money paid to the North Korean IT workers, which was then sent back to the Kim regime through a complex web of overseas co-conspirators.

In one example, these IT workers used fake identities to get hired by a blockchain research and development company in Atlanta, Georgia. Another victim was an unnamed California-based defense contractor that develops artificial intelligence-powered equipment and technology. In this case, the North Koreans managed to steal sensitive employer data along with the company's source code.

The DOJ said that as part of their investigation, they raided 29 known or suspected laptop farms across 16 states and seized 29 financial accounts used to launder the illicit funds. While authorities were able to arrest a New Jersey-based U.S. national working on behalf of the Kim regime, officials said that North Korean actors were aided by dozens of individuals in the U.S., China, the UAE, and Taiwan.

And that, my friends, is the President's Daily Brief for Wednesday, the 2nd of July. Now, if you have any questions or comments, please reach out to me at pdbatthefirsttv.com. And to listen to the show ad-free, it's very simple. Just become a premium member of the President's Daily Brief by visiting pdbpremium.com. And remember to check out our YouTube channel at President's Daily Brief.

Many folks, now admittedly most of them my family, are calling our PDB YouTube channel the best thing on YouTube. Check it out and subscribe if you can. I'm Mike Baker. I'll be back later today with the PDB Afternoon Bulletin. Until then, stay informed, stay safe, stay cool.