Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Army Veteran Admits to Telecom Hack and Extortion Plot
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Army Veteran Admits to Telecom Hack and Extortion Plot

Highlights

  • Former Army soldier admitted to hacking AT&T, Snowflake, and other firms.

  • Criminal activity involved data theft, extortion efforts, and attempted sales to foreign actors.

  • Investigators uncovered links to broader schemes and significant stolen data assets.

Samantha Reed
Last updated: 16 July, 2025 - 3:09 am 3:09 am
Samantha Reed 11 hours ago
Share
SHARE

The intersection of military service and cybercrime drew national attention after Cameron John Wagenius, a 21-year-old former Army soldier, acknowledged his involvement in a major cyberattack scheme against prominent telecommunications firms. This plea unpacks not only technological vulnerabilities exposed through companies such as AT&T and Snowflake but also broader concerns around insider threats and illicit use of sensitive data. Legal observers, cybersecurity researchers, and industry practitioners continue to weigh in on the underlying patterns and the implications for national security. The episode highlights the challenges faced by cloud infrastructure providers and raises ongoing public debate on deterrence afforded by tough legal action.

Contents
How Did the Scheme Unfold?What Companies and Individuals Were Targeted?Who Were the Co-Conspirators and What Evidence Was Found?

Related reporting during earlier stages of the case had speculated about the involvement of internal actors in attacks leveraging Snowflake environments, particularly targeting telecom providers like AT&T. Several reports suggested that multiple threat actors may have been operating in tandem, reflecting a broader pattern of criminal collaboration. Coverage noted attempts by the perpetrators to market stolen data to foreign intelligence, but details on the scope and sophistication of the conspiracy were less clear before disclosure of the charges. The new information confirms direct attempts to sell sensitive data to foreign governments, and federal law enforcement has emphasized the scale, which reportedly included access to records of high-profile individuals and large cryptocurrency holdings.

How Did the Scheme Unfold?

Wagenius admitted to orchestrating a long-running campaign targeting telecommunications firms while still serving in the Army. Prosecutors described his use of online aliases “kiberphant0m” and “cyb3rph4nt0m” across criminal forums to facilitate unauthorized access to company networks, steal confidential records, and engage in extortion efforts. The Department of Justice noted that Wagenius’s actions ranged from selling stolen information to foreign entities to demanding significant ransom payments using threats of public disclosure.

What Companies and Individuals Were Targeted?

Victims allegedly included at least 10 organizations, severely impacting cloud infrastructure used by brands like AT&T and Snowflake. Wagenius and co-conspirators reportedly gained extensive network access and sought to extort $500,000 from one major telecommunications firm, at times leveraging highly sensitive call and text data. Among the breached records were communications of public officials, with data breaches recently confirmed by AT&T stemming from unauthorized access to its Snowflake environment. The attackers allegedly targeted up to 165 companies, broadening the scope of the operation beyond initial estimates.

Who Were the Co-Conspirators and What Evidence Was Found?

Authorities identified Connor Moucka and John Binns as co-conspirators, both indicted on charges tied to extensive extortion activity and cloud service breaches. Moucka consented to U.S. extradition and faces multiple federal charges linked to a widespread campaign impacting Snowflake customers. Investigators recovered stolen identification records and substantial cryptocurrency on devices seized from Wagenius. Research indicated that stolen data was used to commit additional frauds, including SIM-swapping, and some of the information ended up for sale in underground markets.

“Cybercriminals are shockingly slow to update their threat model, and still operate on the assumption that they won’t be jailed and will get a job in the industry afterwards,” Allison Nixon, chief research officer at Unit 221B, said. “As multi-decade sentences pile up, reality will set in: Brazen cybercriminals are much more likely to die in prison than they used to, and anonymity isn’t real.”

This prosecution brings renewed scrutiny of the scale and persistence of cyber threats targeting critical vendors and telecommunications networks. The legal outcome and forthcoming sentencing illustrate an uncommon convergence of insider access, foreign influence attempts, and coordinated extortion schemes. The approach taken by authorities may serve as a deterrent, but also reflects ongoing gaps in organizational security postures and the growing threat landscape around cloud and enterprise platforms. Insights from cases like this one underscore the need for more resilient access controls, frequent credential audits, and robust monitoring of vendor-managed infrastructure. Organizations are advised to consider lessons learned from incident response and to prioritize cross-sector collaboration, given the multi-faceted nature of cybercrime operations exposed in this case.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Senators Question Waltz’s Signal Use in Military Communications

Experts Flag Major Security Flaws in Grok 4 as xAI Expands Federal Access

Virtru Raises $50 Million, Secures Data as AI Use Grows

French Police Hold Ex-Penn State Player on U.S. Ransomware Charge

Experts Warn Trump Bill Hits Healthcare Cybersecurity Funding

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article SS Innovations Expands SSi Mantra Deployment Across Seven Countries
Next Article Nvidia, AMD Resume China AI Chip Sales After US Licensing Shift

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Players Tackle Wordle’s July 16 Puzzle with Fresh Strategies
Gaming
Nvidia, AMD Resume China AI Chip Sales After US Licensing Shift
AI Technology
SS Innovations Expands SSi Mantra Deployment Across Seven Countries
Robotics
Tesla Targets Indian Market, Faces High Price Hurdles with Model Y
Electric Vehicle
Tesla Expands Robotaxi Coverage and Raises Fares in Austin
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?