Ex-Soldier’s Cyber Heist: From Army Boots to Digital Loot!
Cameron John Wagenius, a former US Army soldier, admitted to orchestrating a cyber scheme targeting firms like AT&T and Verizon. Using his online alias “kiberphant0m,” he hacked networks, stole data, and demanded hefty ransoms. Despite his service duties, his side hustle involved extortion and SIM-swapping, seeking a cool million in ill-gotten gains.

Hot Take:
Well, it looks like our favorite “kiberphant0m” couldn’t ghost the authorities this time! From the trenches of the US Army to the depths of the cyber underworld, Wagenius sure had a knack for multitasking. But let’s face it, this isn’t the kind of “service” Uncle Sam had in mind when they said “be all you can be.” Maybe next time, he’ll stick to hacking his way through a plate of army-issued MREs.
Key Points:
- Cameron John Wagenius, aka “kiberphant0m,” pleads guilty to a cybercrime spree targeting telecom giants AT&T and Verizon.
- The operation involved stealing customer data and extorting companies for over $1 million.
- Wagenius utilized a hacking tool called SSH Brute and communicated via encrypted Telegram chats.
- Sentencing set for October 6, with potential for over 20 years in prison.
- The investigation was a joint effort involving the FBI and other federal agencies.
Once a Soldier, Always a Phantom
Meet Cameron John Wagenius, a man who clearly misunderstood the Army’s mantra of “being all you can be.” While some soldiers fight for freedom, Wagenius was fighting for free…dom of data (and a hefty ransom). Operating under the alias “kiberphant0m,” he led a not-so-secret life hacking into telecom companies like AT&T and Verizon. Forget basic training; his covert ops were more about cracking passwords than cracking codes.
The Cyber Heist Chronicles
Between April 2023 and December 2024, Wagenius and his merry band of digital misfits targeted at least ten organizations. Their weapon of choice? A hacking tool named SSH Brute, which sounds more like a workout regime for computer geeks. Armed with stolen credentials, they took to encrypted Telegram chats to plan their next moves. Who knew group chats could be so nefarious?
Data for Dollars
After successfully hacking into systems, the group didn’t just hoard the data like a dragon with its treasure. No, they were in it for the money. They peddled their ill-gotten goodies on cybercrime forums like BreachForums and XSS.is. From SIM-swapping to extortion, these guys made sure they squeezed every dollar out of their digital loot. It’s a wonder they didn’t start a cybercrime loyalty program.
Legal Slam Dunk
Now, Wagenius is facing the music, and it’s not the kind you can dance to. Pleading guilty to a slew of federal charges, he’s looking at a potential 20-year stay in the big house, with an extra two years for identity theft (because apparently, stealing a million bucks’ worth of data isn’t enough without a little identity crisis on the side). His sentencing is scheduled for October 6, and let’s just say he won’t be hacking his way out of this one.
The Long Arm of the Law
This case was cracked wide open thanks to a collaborative effort by the FBI, the Department of Defense’s Office of Inspector General’s Defense Criminal Investigative Service (DCIS), and the US Army’s Criminal Investigative Division, among others. It looks like when it comes to cybercrime, the long arm of the law is more like an octopus, reaching into every corner of the digital deep.
The Cybersecurity Watchdog
Covering this story is Deeba, a seasoned cybersecurity reporter at Hackread.com. With more than a decade of experience in cybercrime analysis, she’s the Sherlock Holmes of the digital age. Her insights and in-depth reporting make her a trusted source in the world of cybersecurity news. If only Wagenius had read her articles, he might have thought twice about his career path.