Finance

Shocking Arrest: US Soldier Charged in Hacking Scheme Involving Stolen Trump and Harris Call Logs!

2025-01-01

Author: Yan

In a startling development, a U.S. Army soldier has been apprehended for allegedly participating in a sophisticated hacking operation involving unauthorized access to sensitive phone records. The 20-year-old, identified as Cameron John Wagenius, has been indicted for allegedly selling confidential phone records on various online forums last November.

Although the indictment doesn't specify the hacked material in detail, sources like KrebsOnSecurity suggest that Wagenius is connected to a notorious hacking figure known by the alias “Kiberphant0m.” This shadowy figure claimed responsibility for breaching the security of 15 telecommunications companies and was purportedly collaborating with another hacker behind the infamous Snowflake data breaches to distribute stolen data.

In November, Kiberphant0m made headlines by allegedly posting AT&T call logs belonging to none other than President-elect Donald Trump and Vice President Kamala Harris. While the authenticity of these logs has yet to be verified, it is known that AT&T previously fell victim to significant data theft during the Snowflake breaches last year. Adding to the intrigue, Kiberphant0m is suspected of selling remote access credentials linked to an influential U.S. defense contractor in 2023.

Reports indicate that Wagenius was stationed at an Army base in South Korea, where he was involved in communications operations. After the alleged leak concerning Trump and Harris, investigative efforts led by Krebs revealed that Kiberphant0m was likely to be a U.S. soldier, further complicating the security implications of this case. In an exclusive exchange, Krebs interviewed Wagenius’s mother, who confirmed his association with the individual behind the Snowflake hacks.

The fallout from this case is profound, not just for national security but also for the cybersecurity community. Experts in the field have reportedly faced harassment while attempting to uncover Kiberphant0m’s identity. Allison Nixon, a leading researcher at cybersecurity firm Unit 221B, aptly commented on the situation: “Anonymously extorting the President and VP as a member of the military is a bad idea, but it’s an even worse idea to harass the experts dedicated to de-anonymizing cybercriminals.”

As this story continues to unfold, the implications of a military member engaging in such criminal activities raises serious questions about cybersecurity protocols within the armed forces and the potential for breaches that could threaten national security. Stay tuned for further updates as the investigation progresses—it’s a story that won’t be disappearing anytime soon!