Particle.news

Download on the App Store

Army Communications Specialist Pleads Guilty to Major Telecom Hacking and Extortion Scheme

His plea exposes how he leveraged military access to siphon telecom credentials for ransom

A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration/File Photo
Image
A former U.S. Army soldier has pleaded guilty to federal charges related to a hacking and extortion scheme targeting telecommunications companies, prosecutors say.

Overview

  • On July 15, Cameron John Wagenius pleaded guilty to conspiracy to commit wire fraud, extortion in relation to computer fraud and aggravated identity theft, facing up to 27 years in prison.
  • Wagenius exploited his active-duty position at Fort Cavazos to deploy a tool called SSH Brute and coordinate with conspirators via Telegram for network intrusions.
  • Between April 2023 and December 2024, he and associates stole login credentials from at least ten carriers and threatened to publish or sell the data on cybercrime forums for about $1 million.
  • Under the alias “kiberphant0m,” Wagenius has also been linked to the 2024 Snowflake cloud breach extortion campaign that targeted more than 160 companies.
  • He is scheduled to be sentenced on October 6 and remains under active investigation by the DOJ, FBI and Defense Criminal Investigative Service alongside co-defendants.