???? Rogue Soldier John Wagenius Turned Cyber Phantom! U.S. Army Hacker Admits $1M Telecom Extortion Plot

More Articles

Tejaswini Deshmukh
Tejaswini Deshmukh
Tejaswini Deshmukh is the contributing editor of RegTech Times, specializing in defense, regulations and technologies. She analyzes military innovations, cybersecurity threats, and geopolitical risks shaping national security. With a Master’s from Pune University, she closely tracks defense policies, sanctions, and enforcement actions. She is also a Certified Sanctions Screening Expert. Her work highlights regulatory challenges in defense technology and global security frameworks. Tejaswini provides sharp insights into emerging threats and compliance in the defense sector.

Cameron John Wagenius, a 21-year-old former U.S. Army soldier, has pleaded guilty to leading a cybercrime scheme that targeted major telecommunications companies. While still serving in the military and stationed in Texas, Wagenius secretly worked with others online to hack into protected systems. He used digital tools and private messaging apps to steal sensitive data from at least 10 companies.

Wagenius, who used the online nickname “kiberphant0m,” and his co-conspirators used a hacking tool called “SSH Brute” to break into company databases. This tool helped them guess login credentials and gain access to secure company networks. These networks held private information, including customer records and internal data. Once inside, the group stole this information and shared stolen credentials in group chats on the app Telegram.

All of this criminal activity happened between April 2023 and December 18, 2024—while Wagenius was still an active member of the U.S. Army. He and his team coordinated attacks, shared stolen data, and planned extortion efforts through private online chats.

???? Spokane’s Berg Busted: $3.3M Payout in Explosive Military Contract Fraud Scheme

Cyber Extortion Through Dark Web Forums

After stealing the data, the group began pressuring the companies to pay ransom money. They threatened to post the stolen information online unless the companies paid large sums. These threats were made both in private messages and on well-known cybercrime forums such as BreachForums and XSS.is.

Wagenius and his co-conspirators even advertised stolen data for sale, sometimes for thousands of dollars. Some of this data was sold successfully. The group also used the stolen information to commit other crimes, including SIM-swapping—where criminals take control of someone’s phone number to access personal and financial accounts.

Johnny Q Nguyen Indicted in Shocking $90K Mail Fraud Scheme

In total, the group attempted to extort over $1 million from affected companies. While some businesses chose not to pay, the hackers still made money by selling private records to buyers in the cybercrime community.

Heavy Charges and Sentencing Ahead

Wagenius has pleaded guilty to three major federal crimes: conspiracy to commit wire fraud, extortion related to computer fraud, and aggravated identity theft. These are serious charges with heavy penalties. He faces up to 20 years in prison for conspiracy to commit wire fraud, up to five years for extortion involving computer fraud, and a mandatory two-year sentence for identity theft. The identity theft sentence must be served in addition to any other prison time he receives.

Keyboard Becomes a Weapon: UK’s Massive £1 Billion Cyber Strike Force To Counter Russian, Chinese Hackers

His sentencing is scheduled for October 6, 2025. This isn’t his first conviction. Wagenius previously pleaded guilty in another case involving the unlawful sharing of confidential phone records, which was also tied to this conspiracy.

Agencies Involved in the Investigation

The investigation was led by the FBI and the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Cyber Field Office. The U.S. Army’s Criminal Investigative Division, U.S. Attorney’s Office for the Western District of Texas, and the National Security Cyber Section also assisted in the case. Cybersecurity firms Flashpoint and Unit 221B provided additional support.

The case was prosecuted by Senior Counsel Louisa Becker and Trial Attorney George Brown from the Justice Department’s Computer Crime and Intellectual Property Section, along with Assistant U.S. Attorney Sok Tea Jiang for the Western District of Washington.

The announcement of the guilty plea was made by Acting Assistant Attorney General Matthew R. Galeotti, Acting U.S. Attorney Teal Luthy Miller, FBI Assistant Director Brett Leatherman, and DCIS Special Agent in Charge Kenneth DeChellis.

To read the original order please visit DOJ website

- Advertisement -

Latest

error: Content is protected !!