Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Army Soldier Charged with Attempting to Sell AT&T Data to Foreign Spies
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Army Soldier Charged with Attempting to Sell AT&T Data to Foreign Spies

Highlights

  • Army soldier attempted to extort AT&T using stolen Snowflake data.

  • He engaged with foreign intelligence services for potential espionage.

  • Case highlights significant insider threats to national security.

Kaan Demirel
Last updated: 28 February, 2025 - 1:59 am 1:59 am
Kaan Demirel 10 months ago
Share
SHARE

Cameron Wagenius, a 21-year-old U.S. Army soldier, is accused of attempting to sell stolen sensitive information to a foreign intelligence service. His efforts included extorting AT&T for $500,000 while threatening to leak phone records of high-ranking officials. This incident demonstrates the evolving threats posed by insiders engaging in cybercriminal activities.

Contents
How Did Wagenius Attempt to Extort AT&T?What Motivated His Actions?What Are the Implications for National Security?

Unlike previous cyberattacks typically conducted by external hackers, this case involves a military insider attempting to collaborate with state-level actors. The targeted data was obtained from Snowflake, a cloud platform previously exploited in significant cyberattacks against multiple organizations, including AT&T. This pattern indicates a persistent strategy to leverage stored data for malicious purposes.

How Did Wagenius Attempt to Extort AT&T?

Wagenius reached out to AT&T through an email address he believed belonged to a foreign intelligence agency. He demanded a ransom of $500,000, threatening to release sensitive phone records obtained from AT&T’s Snowflake environment. These actions were part of a broader scheme to monetize stolen data and exert pressure on the company.

What Motivated His Actions?

Evidence suggests that Wagenius was driven by financial gain and a desire to defect to Russia. Court documents reveal his online searches for defection methods and information about countries that would not extradite him. This dual motivation intertwines personal financial motives with potential espionage alignment.

What Are the Implications for National Security?

Austin Larsen, principal threat analyst at Google Threat Intelligence Group, remarked,

“The alleged attempt to sell data to a foreign intelligence service isn’t just about financial gain — it indicates a willingness to engage with state-level actors, blurring the lines with espionage.”

Allison Nixon, chief research officer at Unit 221B, added,

“This case further underscores the need to recognize this online gang culture — ‘The Com’ — that’s springing up right under our noses. It’s not only an external security threat, but an insider threat. This Army soldier effectively had gang affiliations, which is a huge risk for the special access he had.”

These perspectives highlight the significant risks posed by insider threats in compromising national security.

The involvement of a military member in such a cybercriminal plot raises concerns about the integrity of defense systems and the potential for sensitive data to be exploited by foreign entities. Strengthening security measures and monitoring within military ranks are essential to mitigate these insider threats and protect national interests.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

ServiceNow Moves to Acquire Armis in $7.75 Billion Deal

NIST and MITRE Launch $20 Million AI Cybersecurity Centers

San Antonio Man Admits Leading Child Exploitation Group, Faces Decades in Prison

US Prosecutors Secure Guilty Plea From Nefilim Ransomware Operator

Cybersecurity Workers Plead Guilty to Orchestrating Ransomware Attacks

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Esoteric Ebb Releases Enhanced Demo with Expanded Gameplay
Next Article Firaxis Addresses Civilization 7 Launch Issues with Upcoming Updates

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Garmin Pursues New Watch Features to Compete with Apple and Samsung
Wearables
MSI Katana 15HX B14W Delivers Strong Gaming but Raises Longevity Concerns
Computing
Steam Offers Expansive Game Soundtrack Libraries for Music Fans
Gaming
Serve Robotics CEO Urges Designers to Make AI Products People Enjoy
AI Robotics
Microrobots Swim Autonomously and Perform Complex Tasks Independently
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?