Skip to content

Former U.S. Soldier Pleads Guilty for Hacking Telecommunications Companies

[[{“value”:”

A former Army soldier has admitted to orchestrating a sophisticated cyber attack scheme targeting telecommunications companies, using advanced hacking tools and darknet forums to steal sensitive data and extort victims for substantial ransoms. 

Cameron John Wagenius, 21, who operated under the alias “kiberphant0m,” pleaded guilty to multiple federal charges related to a conspiracy that attempted to extract at least $1 million from victim organizations between April 2023 and December 2024.

Key Takeaways
1. Former soldier Cameron Wagenius, 21, pleaded guilty to hacking telecommunications companies using "SSH Brute" tool and alias "kiberphant0m."
2. Targeted 10+ organizations from April 2023 to December 2024, coordinating attacks through encrypted Telegram chats.
3. Attempted $1 million extortion by threatening to release stolen data on darknet forums and conducting SIM-swapping attacks.
4. Faces up to 27 years in prison with sentencing scheduled for October 6, 2025.

SSH Brute Force Attacks

Wagenius and his co-conspirators employed sophisticated technical methods to breach telecommunications networks, primarily utilizing a custom hacking tool called SSH Brute to obtain unauthorized login credentials. 

The SSH (Secure Shell) brute force attack tool systematically attempted multiple password combinations to gain access to protected computer networks. 

The cybercriminals coordinated their operations through encrypted Telegram group chats, where they exchanged stolen credentials and discussed strategies for penetrating victim companies’ security systems.

The technical sophistication of the operation extended beyond basic credential theft. The conspirators demonstrated advanced persistent threat (APT) capabilities by maintaining long-term access to compromised networks while remaining undetected.

Their methodical approach involved reconnaissance phases to identify high-value targets within telecommunications infrastructure, followed by lateral movement through corporate networks to access sensitive customer databases and proprietary information.

Following successful data exfiltration, the conspirators launched a multi-pronged extortion campaign utilizing both private communications and public cybercrime forums. 

They threatened to release stolen telecommunications data on notorious darknet marketplaces, specifically BreachForums and XSS.is, unless substantial ransoms were paid. 

These platforms serve as primary venues for cybercriminals to monetize stolen data and coordinate illicit activities.

The financial impact extended beyond direct extortion attempts. The conspirators successfully sold portions of stolen data for thousands of dollars and leveraged the compromised information for SIM-swapping attacks. 

SIM-swapping involves fraudulently transferring a victim’s phone number to a criminal’s SIM card, enabling unauthorized access to two-factor authentication systems and financial accounts. 

This technique demonstrates the cascading effects of telecommunications breaches, where initial data theft enables subsequent financial crimes.

Wagenius faces severe federal penalties following his guilty plea to conspiracy to commit wire fraud, extortion in relation to computer fraud, and aggravated identity theft. 

The wire fraud conspiracy charge carries a maximum sentence of 20 years imprisonment, while the computer fraud extortion charge allows for up to five years. 

Additionally, the aggravated identity theft conviction mandates a consecutive two-year sentence, meaning this time cannot be served concurrently with other penalties.

The case represents a significant victory for federal cybercrime prosecution, involving coordination between multiple agencies, including the FBI’s Cyber Division, the Department of Defense Office of Inspector General’s Defense Criminal Investigative Service, and the U.S. Army’s Criminal Investigative Division. 

Wagenius’s sentencing is scheduled for October 6, 2025, with final penalties determined by federal district court guidelines.

Investigate live malware behavior, trace every step of an attack, and make faster, smarter security decisions -> Try ANY.RUN now

The post Former U.S. Soldier Pleads Guilty for Hacking Telecommunications Companies appeared first on Cyber Security News.

“}]] 

Read More  Cyber Security News