Shocking Breach: U.S. Army Soldier Charged with Stealing Telecom Records

More Articles

Ruta Kulkarni
Ruta Kulkarni
Ruta Kulkarni is the senior journalist at Regtechtimes and covers the global desk. She specialise in the Department of Justice, SEC and EU Actions.

In a shocking case involving cybercrime and a U.S. Army soldier, a young military member has been arrested in Texas for stealing and selling sensitive customer data. The soldier, stationed in South Korea at the time of the incident, is accused of hacking into major telecommunications companies like AT&T and Verizon. The stolen data included call logs of prominent government officials and emergency responders, raising serious concerns about the security of personal and confidential information.

The Arrest and Charges against Army Soldier John Wagenius

The Army soldier involved, Cameron John Wagenius, is 20 years old and served as a communications specialist in the U.S. Army. According to reports, he is believed to be the individual behind the cybercriminal identity known as Kiberphant0m. This individual reportedly took credit for hacking into at least 15 telecommunications companies, including the two largest in the U.S., AT&T and Verizon.

The indictment, which was posted online, revealed that the Army soldier, Wagenius, faces two serious charges. These charges involve the unlawful transfer of confidential phone records. Although the indictment did not provide many specific details, it paints a picture of how sensitive information was accessed and sold for profit.

Wagenius had been stationed abroad when the crimes occurred but allegedly continued his cybercrimes by using encrypted online platforms. He is believed to have stolen valuable data from telecommunications companies and sold it to various buyers. The most alarming of the stolen data included call logs and customer information, which were later used to target high-profile individuals. The stolen data, as reported, even included the private phone records of government officials, such as the President-elect and Vice President of the United States.

How the Hacking Took Place

Kiberphant0m, the alias used by the Army soldier accused of the cybercrimes, reportedly bragged about his ability to hack into some of the largest telecommunications firms in the world. Through online forums, the hacker claimed to have gained access to the internal systems of companies like AT&T and Verizon. These companies provide critical services like mobile phone networks, emergency communication, and more.

In one instance, Kiberphant0m shared details on an online platform about possessing private data, including phone call logs that belonged to prominent individuals such as government officials. These logs were reportedly taken from Verizon’s Push-to-Talk (PTT) service, which is primarily used by emergency first responders and government agencies. The hacking incident raised alarms about the vulnerability of crucial communication networks used by the U.S. government and emergency services.

The Army soldier, operating under the Kiberphant0m alias, not only boasted about the theft but also attempted to sell the stolen information online. Using encrypted messaging platforms like Telegram, the hacker posted threads offering for sale the data of customers from both AT&T and Verizon. This data, which included sensitive call logs, is often targeted by cybercriminals due to its valuable and personal nature. The sale of this stolen data highlighted the ongoing threat of cyberattacks on telecommunications infrastructure.

The Connection to Other Cybercrimes

In addition to his activities as Kiberphant0m, the Army soldier, Wagenius, reportedly had ties to other cybercriminals. According to interviews with people connected to the case, Wagenius admitted to being associated with a hacker named Connor Riley Moucka, known by the alias Judische. Moucka had been arrested earlier for stealing data from companies that used cloud services provided by Snowflake. This connection raised questions about the involvement of organized cybercriminal groups working together to steal and trade sensitive information.

The involvement of military personnel in these types of cybercrimes highlights a growing trend of cyberattacks originating from within organizations trusted with national security. Such breaches can have far-reaching consequences, both in terms of compromised personal information and the potential to undermine the trust in government and private sector systems that handle sensitive data.

The case against the Army soldier, Wagenius, serves as a stark reminder of the dangers posed by cybercriminals and the vulnerabilities in systems that hold highly sensitive data. Whether through hacking, social engineering, or other methods, these attacks demonstrate that no system is entirely secure. Given the nature of the stolen data, this case also raises concerns about the broader security of communication networks that are essential to both everyday life and national security.

In this case, a U.S. Army soldier has been arrested and charged for the illegal transfer of confidential phone records, resulting from a series of high-profile hacks into major telecommunications companies. The hacker, known as Kiberphant0m, targeted AT&T and Verizon, stealing and selling sensitive customer information. This incident sheds light on the growing threat of cybercrime and its potential impact on national security, especially when sensitive data from emergency responders and government officials is involved.

- Advertisement -spot_imgspot_img

Latest

error: Content is protected !!