Security

Cyber-crime

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime


The US Army soldier suspected of compromising AT&T and bragging about getting his hands on President Trump's call logs allegedly tried to sell stolen information to a foreign intel agent.

The military man even Google searched for "can hacking be treason," and "US military personnel defecting to Russia," according to prosecutors who argue he poses a serious flight risk and should be detained.

Cameron John Wagenius, 21, was arrested in Texas in December, and last week told a federal court judge he intends to plead guilty to unlawfully posting and transferring confidential phone records. 

Prosecutors have also linked Wagenius to two other men accused of stealing data from more than 150 Snowflake cloud accounts in April 2024, and then demanding payment to keep a lid on that info.

After admitting his crimes in court, and showing a willingness to enter a guilty plea, "Wagenius should be detained as both a danger to the community — given his ability to access sensitive datasets — and a serious risk of flight," Uncle Sam's attorneys argued.

In federal court documents [PDF] filed Wednesday in Seattle, Washington, the US Department of Justice revealed fresh allegations of Wagenius' wider extortion and computer intrusion capers, and what could be some very ill-advised Google search terms.

"While engaged in these criminal activities, Wagenius conducted online searches about how to defect to countries that do not extradite to the United States and that he previously attempted to sell hacked information to at least one foreign intelligence service," the documents allege. 

Wagenius, we're told, while on active military duty and using the online monikers kiberphant0m and cyb3rph4nt0m, bragged about infiltrating 15 telecommunications providers, and then posted on a dark-web forum call records belonging to high-ranking public officials and their family members. While neither the public officials nor the breached firms are named in the court documents, they reportedly included AT&T, Verizon, Donald Trump, and Kamala Harris. 

After stealing digital data from one organization, Wagenius then tried "multiple" times to extort this "Victim-1," believed to be AT&T, and threatened the American telco with messages, it is alleged, like this one detailed in the court filing:

Let's start off, a little thing you should know about me. I get what I want and when I don't get what I want in my own timeframes that I set I will do what I say. I don't care if I don't receive the money involved in the extortions. I already made your samples and data on [REDACTED] available to everybody on breachforums. I will leak much much much more, literally all of it.

Around the same time in November 2024, Wagenius allegedly communicated with an email address that he believed belonged to another nation's military intelligence service and tried to sell it stolen information. The court documents don't specify which country, but judging from Wagenius' alleged search history it would appear to be Russia.

Before and after allegedly breaking into phone companies' networks, stealing people's call data, and trying to extort organizations for cash, Wagenius also conducted several searches related to fleeing the US, the Feds claim. A "subset" of these searches occurring over "multiple weeks," according to prosecutors, including:

The g-men also said they found additional evidence on Wagenius' devices, including thousands of stolen ID documents such as passports and drivers' licenses, at least one fake ID he created for himself, and large sums of cryptocurrency, indicating his intent to flee.

Plus, in October 2024, it's said he messaged a potential co-conspirator with the following: "What's funny is that if I ever get found out, I can't get instantly arrested because of military law, which gives me time to go AWOL."

It's unclear who this potential co-conspirator is, but Wagenius has been connected to two other Snowflake extortion suspects - Alexander "Connor" Moucka and John Binns, who allegedly netted at least $2 million from AT&T, Ticketmaster, and other victims of the heist. 

Moucka was arrested in Canada, and Binns in Turkey. Both are awaiting extradition. ®

Send us news
33 Comments

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

More victims of China's Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs

Networks in US and beyond compromised by Beijing's super-snoops pulling off priv-esc attacks