US soldier hacking case updates reveal that a 21-year-old former U.S. Army private has pleaded guilty to hacking multiple telecommunications and cloud storage companies, stealing massive datasets, and extorting victims for millions.
The hacker, Cameron John Wagenius, also known by the alias kiberphantOm, admitted to breaching companies like T-Mobile, Verizon, and Snowflake, stealing sensitive data while serving on active duty.
What Did Wagenius Do?
According to the US Department of Justice (DOJ), Wagenius:
- Infiltrated at least 10 organizations
- Stole data from telecom and cloud storage companies
- Attempted to extort at least $1 million
- Operated under the alias kiberphantOm while in the US Army
He used stolen credentials to breach internal systems and worked with other conspirators to distribute and sell the stolen data online.
Data Leaks and Victims
The US soldier hacking case includes data stolen from Snowflake cloud storage accounts, affecting top global brands. Breached data included:
- 560 million Ticketmaster records
- AT&T call logs, including logs tied to President Joe Biden and Vice President Kamala Harris
- Data from companies like Santander Bank and Advance Auto Parts
Investigators believe some stolen records were posted or sold on cybercrime marketplaces like BreachForums and XSS.is.
Who Else Was Involved?
The DOJ has charged two additional individuals:
- John Binns – Allegedly involved in previous telecom attacks
- Connor Moucka – Arrested in Canada in 2023 for breaching Snowflake accounts
All three conspirators used Telegram group chats to share credentials and coordinate access to victim networks.
Snowflake Breaches: A Widespread Threat
Snowflake cloud storage has become a prime target. Attackers breached at least 165 Snowflake accounts, with some victims failing to enable multi-factor authentication (MFA)—leaving critical data exposed.
Companies affected include:
- Ticketmaster – 560M records stolen
- Santander Bank
- Advance Auto Parts
- AT&T – Logs tied to high-profile figures were leaked
Legal Consequences
Wagenius now faces up to 20 years in prison after pleading guilty to:
- Hacking telecom networks
- Conspiracy to commit extortion
- Aggravated identity theft
He committed the crimes while serving at Fort Cavazos (formerly Fort Hood) in Texas.
Conclusion: US Soldier Hacking Case Raises National Security Questions
The US soldier hacking case not only highlights major cybersecurity gaps in large corporations but also raises serious questions about internal military oversight. With telecom data, cloud storage records, and presidential call logs involved, the case shows how even one insider can wreak havoc on a global scale.


0 responses to “US Soldier Hacking Case: Ex-Army Private Pleads Guilty to Telecom Cyberattacks”