Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Crime AT&T United States Verizon

US Army Soldier Arrested In AT&T, Verizon Extortions (krebsonsecurity.com) 10

An anonymous reader quotes a report from KrebsOnSecurity: Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea. Cameron John Wagenius was arrested near the Army base in Fort Hood, Texas on Dec. 20, after being indicted on two criminal counts of unlawful transfer of confidential phone records. The sparse, two-page indictment (PDF) doesn't reference specific victims or hacking activity, nor does it include any personal details about the accused. But a conversation with Wagenius' mother -- Minnesota native Alicia Roen -- filled in the gaps.

Roen said that prior to her son's arrest he'd acknowledged being associated with Connor Riley Moucka, a.k.a. "Judische," a prolific cybercriminal from Canada who was arrested in late October for stealing data from and extorting dozens of companies that stored data at the cloud service Snowflake. In an interview with KrebsOnSecurity, Judische said he had no interest in selling the data he'd stolen from Snowflake customers and telecom providers, and that he preferred to outsource that to Kiberphant0m and others. Meanwhile, Kiberphant0m claimed in posts on Telegram that he was responsible for hacking into at least 15 telecommunications firms, including AT&T and Verizon. On November 26, KrebsOnSecurity published a story that followed a trail of clues left behind by Kiberphantom indicating he was a U.S. Army soldier stationed in South Korea.

[...] Immediately after news broke of Moucka's arrest, Kiberphant0m posted on the hacker community BreachForums what they claimed were the AT&T call logs for President-elect Donald J. Trump and for Vice President Kamala Harris. [...] On that same day, Kiberphant0m posted what they claimed was the "data schema" from the U.S. National Security Agency. On Nov. 5, Kiberphant0m offered call logs stolen from Verizon's push-to-talk (PTT) customers -- mainly U.S. government agencies and emergency first responders. On Nov. 9, Kiberphant0m posted a sales thread on BreachForums offering a "SIM-swapping" service targeting Verizon PTT customers. In a SIM-swap, fraudsters use credentials that are phished or stolen from mobile phone company employees to divert a target's phone calls and text messages to a device they control.

US Army Soldier Arrested In AT&T, Verizon Extortions

Comments Filter:
  • Fort Cavazos (Score:3, Informative)

    by mad_ian ( 28771 ) on Tuesday December 31, 2024 @05:03PM (#65053807) Homepage

    Fort Hood hasn't been designated as such since May 2023. It's Fort Cavazos.

    • The article says Fort Hood.
      • The article says Fort Hood.

        So? It appears the article author isn't that well-informed on the names of military installations. Color me not shocked.

        • by Mousit ( 646085 )

          The article says Fort Hood.

          So? It appears the article author isn't that well-informed on the names of military installations. Color me not shocked.

          Not even well-informed on the names of cities either, since more specifically the article and summary say "...the Army base in Fort Hood, Texas..." which is not and was never correct. Even back when the base was called Fort Hood, it was "the Army base in KILLEEN, Texas". Which the city still is, regardless of the base's change in name.

  • by Okian Warrior ( 537106 ) on Tuesday December 31, 2024 @05:19PM (#65053837) Homepage Journal

    From the article (that I read in detail, plus the older linked article):

    Roen said that prior to her son's arrest he'd acknowledged being associated with Connor Riley Moucka, a.k.a. "Judische," a prolific cybercriminal from Canada who was arrested in late October for stealing data from and extorting dozens of companies that stored data at the cloud service Snowflake. In an interview with KrebsOnSecurity, Judische said he had no interest in selling the data he'd stolen from Snowflake customers and telecom providers, and that he preferred to outsource that to Kiberphant0m and others. Meanwhile, Kiberphant0m claimed in posts on Telegram that he was responsible for hacking into at least 15 telecommunications firms, including AT&T and Verizon. On November 26, KrebsOnSecurity published a story that followed a trail of clues left behind by Kiberphantom indicating he was a U.S. Army soldier stationed in South Korea.

    From the comments to the article:

    [User named "Alicia Roen"]
    I am his mother and I am not an open book, I was asked general questions about my sons age and if he was a solider! That is all I said and Krebs already had this information. I never knew my son was involved in any of this or involved with others until I read Krebs 1st article following my sons arrest, which was all new news to me! Do you really think a child would ever tell his parents he was involved in criminal activity?

    This got me to look more closely at the 1st paragraph and...

    Note that the paragraph starts with a comment from Roen (the mother) about her son, then goes galley west into the hacker "Judische" and his crimes and his involvement with Kiberphantom and *his crimes*.

    That is a highly, *highly* misleading paragraph there, it fairly screams "he's guilty and the mother confirmed it!". And the comment from the mother makes a great deal of sense, in that it's highly unlikely that her son would tell her that he was associated with Judische.

    While I suspect that the base information is probably correct (US military young man is the cybercriminal), the report on the KOS website is click-baity and doesn't pass the sniff test.

"Nuclear war would really set back cable." - Ted Turner

Working...