US Soldier by Day, Cybercriminal by Night: Kiberphant0m (Wagenius) Arrested

Summary :

  • Before coming back to the United States, Wagenius worked as a communications specialist in South Korea, where he had access to vital networks.
  • According to court documents, which did not identify his rank or place of station. Cameron John Wagenius was arrested on December 20 and charged with two separate charges of improper transmission of confidential phone records information in the Western District of Texas courthouse in Waco.
  • According to authorities, he is “Kiberphant0m,” connected to the sale and disclosure of private information from Verizon and AT&T.

Whatt Did This US Army Specialist Do with the alias Kiberphant0m ?

Kiberphant0m claimed to be selling stolen telecom data, including files pertaining to the NSA, and operated on websites such as Telegram and BreachForums. He helped sell and leak extremely sensitive data, even though he was not hacking directly.

In his Telegram posts, Kiberphant0m claimed to have hacked into at least 15 telecom companies, including Verizon and AT&T.According to Ms. Roen, Cameron spent the previous two years working on radio signals and network communications at an Army installation in South Korea, with occasional trips back to the US.

Later articles promoted SIM-swapping services aimed at PTT users and sold call logs of Verizon’s Push-to-Talk (PTT) services, which are primarily utilised by first responders and members of the US government.

“I never was aware he was into hacking, It was definitely a shock to me when we found this stuff out.”

She claimed that although Cameron was always good with computers, she was unaware that he might have engaged in illegal hacking.

Kiberphant0m shared what they claimed to be the AT&T call logs for Vice President Kamala Harris and President-elect Donald J. Trump on the hacker group BreachForums as soon as word leaked out of Moucka’s arrest. The same day, Kiberphant0m shared what they said was the U.S. National Security Agency’s “data structure.”

“knowingly and intentionally sell and transfer, and attempt to sell and transfer, confidential phone records information of a covered entity, without prior authorization from the customer to whom such confidential phone records information was obtained fraudulently.”

The court filings state that on or around November 6

The arrest is also connected to previous actions in which the suspect illegally maintained a large botnet for launching distributed denial-of-service (DDoS) attacks and sold remote access to a U.S. defence contractor’s network.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top