这是用户在 2025-1-6 10:14 为 https://gbhackers.com/us-army-soldier-arrested-for-allegedly-selling-customer-call/ 保存的双语快照页面,由 沉浸式翻译 提供双语支持。了解如何保存?
Sunday, January 5, 2025  2025 年 1 月 5 日(星期日)
HomeCyber Security NewsUS Army Soldier Arrested for Allegedly Selling Customer Call Records From AT&T...
首页网络安全新闻美国陆军士兵因涉嫌出售 AT&T 的客户通话记录而被捕...

US Army Soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon
美国陆军士兵因涉嫌出售AT&T和Verizon的客户通话记录而被捕

Published on  发布时间:

SIEM as a Service

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential customer call records stolen from major telecommunications companies AT&T and Verizon.
一名20岁的美国陆军士兵卡梅隆·约翰·瓦吉恩因涉嫌出售从主要电信公司AT&T和Verizon窃取的机密客户通话记录而被联邦当局逮捕和起诉。

Known online as “Kiberphant0m,” Wagenius was apprehended near an Army base in Fort Hood, Texas, on December 20. He faces two criminal counts of unlawfully transferring sensitive phone records.
Wagenius 在网上被称为“Kiberphant0m”,于 12 月 20 日在德克萨斯州胡德堡的一个陆军基地附近被捕。他面临两项非法传输敏感电话记录的刑事指控。

One of several selfies on the Facebook page of Cameron Wagenius.
One of several selfies on the Facebook page of Cameron Wagenius.
Cameron Wagenius 的 Facebook 页面上的几张自拍照之一。

Cybercrime Allegations and Shocking Ties
网络犯罪指控和令人震惊的联系

Wagenius, who served as a communications specialist in the U.S. Army and was recently stationed in South Korea, is accused of using his technical expertise to orchestrate a series of cybercrimes.
Wagenius 曾在美国陆军担任通信专家,最近驻扎在韩国,被指控利用他的技术专长策划了一系列网络犯罪。

- Advertisement -  -广告- SIEM as a Service

The indictment links him to the sale and leakage of sensitive data from at least 15 telecommunications companies. These records allegedly included call logs belonging to high-profile individuals, such as government officials.
起诉书将他与至少 15 家电信公司出售和泄露敏感数据联系起来。据称,这些记录包括属于政府官员等知名人士的通话记录。

According to Grebs On Security, the investigation gained traction in November 2024 after cybersecurity journalist Brian Krebs identified Wagenius as a potential suspect.
据 Grebs On Security 称,在网络安全记者 Brian Krebs 将 Wagenius 确定为潜在嫌疑人后,该调查于 2024 年 11 月获得关注。

The trail of evidence, found in Telegram messages and hacker forums like BreachForums, pointed to his involvement in various criminal activities, including SIM-swapping services and distributed denial-of-service (DDoS) attacks.
在 Telegram 消息和 BreachForums 等黑客论坛中发现的证据线索表明,他参与了各种犯罪活动,包括 SIM 卡交换服务和分布式拒绝服务 (DDoS) 攻击。

Wagenius reportedly collaborated with Canadian cybercriminal Connor Riley Moucka, also known as “Judische,” who was arrested in October for extorting companies and stealing data from cloud service provider Snowflake.
据报道,Wagenius 与加拿大网络犯罪分子 Connor Riley Moucka(也被称为“Judische”)合作,后者于 10 月因敲诈公司和窃取云服务提供商 Snowflake 的数据而被捕。

Moucka had entrusted Kiberphant0m to sell stolen information, including data from AT&T and Verizon customers, as well as offering access to U.S. defense contractor systems.
Moucka 委托 Kiberphant0m 出售被盗信息,包括来自 AT&T 和 Verizon 客户的数据,并提供对美国国防承包商系统的访问。

After Moucka’s arrest, Kiberphant0m escalated his activities, posting AT&T call logs allegedly belonging to President-elect Donald Trump and Vice President Kamala Harris, further threatening to leak additional government call records.
在Moucka被捕后,Kiberphant0m升级了他的活动,发布了据称属于当选总统唐纳德·特朗普和副总统卡马拉·哈里斯的AT&T通话记录,进一步威胁要泄露更多的政府通话记录。

Kiberphant0m posting what he claimed was a “data schema” stolen from the NSA via AT&T.
Kiberphant0m posting what he claimed was a “data schema” stolen from the NSA via AT&T.
Kiberphant0m发布了他声称是通过AT&T从NSA窃取的“数据模式”的内容。

On November 5, he offered Verizon push-to-talk (PTT) call logs — a service frequently used by U.S. government agencies and emergency responders.
11 月 5 日,他向 Verizon 提供了一键通 (PTT) 通话记录,这是美国政府机构和紧急救援人员经常使用的一项服务。

In his final online activities, Kiberphant0m claimed to have stolen data from the National Security Agency (NSA) and advertised compromised credentials of a U.S. defense contractor.
在他最后的在线活动中,Kiberphant0m 声称从国家安全局 (NSA) 窃取了数据,并宣传了一家美国国防承包商的被盗凭证。

Wagenius’ digital footprint, including Facebook photos showing him in uniform, further linked his real-world identity to his online persona.
Wagenius 的数字足迹,包括显示他穿着制服的 Facebook 照片,进一步将他的真实身份与他的在线角色联系起来。

Cybersecurity analyst Allison Nixon, from Unit 221B, played a key role in uncovering Wagenius’ identity.
来自 221B 部队的网络安全分析师 Allison Nixon 在揭露 Wagenius 的身份方面发挥了关键作用。

She highlighted the unprecedented speed of law enforcement response, stating it was the fastest resolution to a U.S. federal cyber case in her experience.
她强调了执法部门前所未有的响应速度,并表示这是根据她的经验解决美国联邦网络案件的最快速度。

Nixon also warned other young cyber criminals of the severe consequences of engaging in illegal activities.“This should serve as a wake-up call,” Nixon said. “Law enforcement is getting better and faster at unmasking cybercriminals. It’s not worth the risk.”
尼克松还警告其他年轻的网络犯罪分子,从事非法活动的严重后果。这应该是一个警钟,“尼克松说。“执法部门在揭露网络犯罪分子方面越来越好、越来越快。不值得冒险。

The case has been transferred to the U.S. District Court for the Western District of Washington in Seattle, where Wagenius will face trial.
该案已移交给西雅图的美国华盛顿西区联邦地区法院,Wagenius 将在那里接受审判。

If convicted, this case will underscore the growing sophistication of law enforcement in tackling cybercrime and the risks posed by insiders with access to sensitive systems.
如果被定罪,此案将突显执法部门在打击网络犯罪方面日益复杂,以及内部人员访问敏感系统所带来的风险。

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
使用ANY调查现实世界的恶意链接、恶意软件和网络钓鱼攻击。RUN – 免费试用

Divya
Divya  迪维亚
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.
Divya 是 GBhackers 的高级记者,负责报道网络攻击、威胁、违规、漏洞和网络世界中的其他事件。

Latest articles  最新文章

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware
LegionLoader 滥用 Chrome 扩展程序提供信息窃取恶意软件

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...
LegionLoader 是一种 C/C++ 下载器恶意软件,于 2019 年首次出现,可提供恶意 Chrome 等有效负载......

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands
ASUS Critical 漏洞可让攻击者执行任意命令

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...
在最近的安全公告中,华硕提醒用户注意影响多个...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours
NTT Docomo 遭到 DDoS 攻击,服务中断 11 小时

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...
NTT Docomo 是日本领先的电信和 IT 服务提供商之一,经历了一场巨大的...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit
Apple 同意就 Siri 隐私诉讼达成 $95M 和解

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...
Apple Inc. 已同意支付 9500 万美元以解决拟议的集体诉讼...

API Security Webinar  API 安全网络研讨会

72 Hours to Audit-Ready API Security
72 小时即可实现审计就绪的 API 安全性

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.
API 在这种环境中提出了独特的挑战,因为风险评估和缓解经常受到不完整的 API 清单和文档不足的阻碍。

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
API 发现:全面识别和映射公有 API 的技术。

Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
漏洞扫描:API 漏洞分析和渗透测试的最佳实践。

Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.
清理报告:在 72 小时内生成干净、可供审计的漏洞报告的步骤。

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...