2.7 C
New York
Friday, January 10, 2025

US soldier arrested after allegedly posting hacked Trump and Harris name logs


The US has arrested a US Military soldier and charged him with being a part of a hacking scheme to promote and distribute stolen cellphone data. An indictment alleges that 20-year-old Cameron John Wagenius knowingly offered “confidential cellphone data” over on-line boards and different communications platforms final November.

The indictment doesn’t element the hacked materials, however KrebsOnSecurity stories that Wagenius seems to be related to a collection of high-profile knowledge breaches linked to the web alias “Kiberphant0m.” Kiberphant0m claimed to have hacked 15 telecom corporations and was working with the particular person allegedly behind the Snowflake knowledge breaches to promote the stolen info.

In November, Kiberphant0m posted what they claimed have been AT&T name logs for President-elect Donald Trump and Vice President Kamala Harris. It’s not clear if the info was real, however AT&T did endure a main theft of buyer knowledge as a part of the Snowflake account breaches final yr. In 2023, the hacker can be alleged to have offered “distant entry credentials for a serious U.S. protection contractor,” in response to Krebs.

Krebs stories that Wagenius labored on communications at an Military base in South Korea. After the alleged leak of Trump and Harris knowledge, Krebs did a deep dive into Kiberphant0m’s on-line communications and recognized that they have been probably a US soldier. On this newest report, Krebs spoke with Wagenius’ mom, who confirmed his connection to the alleged Snowflake hacker.

Cybersecurity consultants reportedly acquired harassment for attempting to trace down Kiberphant0m’s id, resulting in this unbelievable quote from Allison Nixon, the lead researcher at cybersecurity agency Unit 221B, who was a part of the work. “Anonymously extorting the President and VP as a member of the navy is a nasty concept,” Nixon informed Krebs, “however it’s a fair worse concept to harass individuals who concentrate on de-anonymizing cybercriminals.”

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles