A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential customer call records stolen from major telecommunications companies AT&T and Verizon.
一名20岁的美国陆军士兵卡梅隆·约翰·瓦吉恩因涉嫌出售从主要电信公司AT&T和Verizon窃取的机密客户通话记录而被联邦当局逮捕和起诉。
Known online as “Kiberphant0m,” Wagenius was apprehended near an Army base in Fort Hood, Texas, on December 20. He faces two criminal counts of unlawfully transferring sensitive phone records.
Wagenius 在网上被称为“Kiberphant0m”,于 12 月 20 日在德克萨斯州胡德堡的一个陆军基地附近被捕。他面临两项非法传输敏感电话记录的刑事指控。
Cybercrime Allegations and Shocking Ties
网络犯罪指控和令人震惊的联系
Wagenius, who served as a communications specialist in the U.S. Army and was recently stationed in South Korea, is accused of using his technical expertise to orchestrate a series of cybercrimes.
Wagenius 曾在美国陆军担任通信专家,最近驻扎在韩国,被指控利用他的技术专长策划了一系列网络犯罪。
The indictment links him to the sale and leakage of sensitive data from at least 15 telecommunications companies. These records allegedly included call logs belonging to high-profile individuals, such as government officials.
起诉书将他与至少 15 家电信公司出售和泄露敏感数据联系起来。据称,这些记录包括属于政府官员等知名人士的通话记录。
According to Grebs On Security, the investigation gained traction in November 2024 after cybersecurity journalist Brian Krebs identified Wagenius as a potential suspect.
据 Grebs On Security 称,在网络安全记者 Brian Krebs 将 Wagenius 确定为潜在嫌疑人后,该调查于 2024 年 11 月获得关注。
The trail of evidence, found in Telegram messages and hacker forums like BreachForums, pointed to his involvement in various criminal activities, including SIM-swapping services and distributed denial-of-service (DDoS) attacks.
在 Telegram 消息和 BreachForums 等黑客论坛中发现的证据线索表明,他参与了各种犯罪活动,包括 SIM 卡交换服务和分布式拒绝服务 (DDoS) 攻击。
Wagenius reportedly collaborated with Canadian cybercriminal Connor Riley Moucka, also known as “Judische,” who was arrested in October for extorting companies and stealing data from cloud service provider Snowflake.
据报道,Wagenius 与加拿大网络犯罪分子 Connor Riley Moucka(也被称为“Judische”)合作,后者于 10 月因敲诈公司和窃取云服务提供商 Snowflake 的数据而被捕。
Moucka had entrusted Kiberphant0m to sell stolen information, including data from AT&T and Verizon customers, as well as offering access to U.S. defense contractor systems.
Moucka 委托 Kiberphant0m 出售被盗信息,包括来自 AT&T 和 Verizon 客户的数据,并提供对美国国防承包商系统的访问。
After Moucka’s arrest, Kiberphant0m escalated his activities, posting AT&T call logs allegedly belonging to President-elect Donald Trump and Vice President Kamala Harris, further threatening to leak additional government call records.
在Moucka被捕后,Kiberphant0m升级了他的活动,发布了据称属于当选总统唐纳德·特朗普和副总统卡马拉·哈里斯的AT&T通话记录,进一步威胁要泄露更多的政府通话记录。
On November 5, he offered Verizon push-to-talk (PTT) call logs — a service frequently used by U.S. government agencies and emergency responders.
11 月 5 日,他向 Verizon 提供了一键通 (PTT) 通话记录,这是美国政府机构和紧急救援人员经常使用的一项服务。
In his final online activities, Kiberphant0m claimed to have stolen data from the National Security Agency (NSA) and advertised compromised credentials of a U.S. defense contractor.
在他最后的在线活动中,Kiberphant0m 声称从国家安全局 (NSA) 窃取了数据,并宣传了一家美国国防承包商的被盗凭证。
Wagenius’ digital footprint, including Facebook photos showing him in uniform, further linked his real-world identity to his online persona.
Wagenius 的数字足迹,包括显示他穿着制服的 Facebook 照片,进一步将他的真实身份与他的在线角色联系起来。
Cybersecurity analyst Allison Nixon, from Unit 221B, played a key role in uncovering Wagenius’ identity.
来自 221B 部队的网络安全分析师 Allison Nixon 在揭露 Wagenius 的身份方面发挥了关键作用。
She highlighted the unprecedented speed of law enforcement response, stating it was the fastest resolution to a U.S. federal cyber case in her experience.
她强调了执法部门前所未有的响应速度,并表示这是根据她的经验解决美国联邦网络案件的最快速度。
Nixon also warned other young cyber criminals of the severe consequences of engaging in illegal activities.“This should serve as a wake-up call,” Nixon said. “Law enforcement is getting better and faster at unmasking cybercriminals. It’s not worth the risk.”
尼克松还警告其他年轻的网络犯罪分子,从事非法活动的严重后果。这应该是一个警钟,“尼克松说。“执法部门在揭露网络犯罪分子方面越来越好、越来越快。不值得冒险。
The case has been transferred to the U.S. District Court for the Western District of Washington in Seattle, where Wagenius will face trial.
该案已移交给西雅图的美国华盛顿西区联邦地区法院,Wagenius 将在那里接受审判。
If convicted, this case will underscore the growing sophistication of law enforcement in tackling cybercrime and the risks posed by insiders with access to sensitive systems.
如果被定罪,此案将突显执法部门在打击网络犯罪方面日益复杂,以及内部人员访问敏感系统所带来的风险。
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
使用ANY调查现实世界的恶意链接、恶意软件和网络钓鱼攻击。RUN – 免费试用