Army

Critical Hack Blamed on Previously Arrested Army Soldier

Now that the DOJ “has linked the arrest of a serving U.S. Army soldier” in December to a massive hack of AT&T and Verizon last year, FBI rats can breath a little easier. The bureau recently notified them that data which can identify them was loose in the wild. It’s a really good thing President Donald Trump plans to clean out the Pentagon. There have been too many service members accused of serious crimes under the current watch.

Army Soldier linked

When Army soldier Cameron John Wagenius was arrested in December, the feds charged him with “trying to sell confidential phone records of both Donald Trump and Kamala Harris.

On Friday, January 17, the DOJ linked him to an even bigger breach. A “massive hack of AT&T and Verizon last year.

The phone company compromise is listed as “one of the most wide-reaching attacks of 2024, with more than 160 companies impacted.” The attackers stole “millions of phone records from telecom giants.

Army
An active duty U.S. Army soldier has been linked to the massive hack of AT&T and Verizon last year.

Besides the incoming and outgoing call logs of FBI agents, “victims also included major corporations such as LendingTree, Santander Bank, and Ticketmaster.” Nobody expected one of our Army soldiers to be responsible. Apparently, he has too much time on his hands and not enough supervision. Incoming Secretary of Defense Pete Hegseth plans to change that.

The phone companies share some of the blame. An ordinary hacker, even one with Army training, shouldn’t be able to walk right through “weak cybersecurity measures.” The telecom giants made it easy through “the lack of multi-factor authentication.

The soldier and his associates were easily able to “siphon customer and corporate data using stolen passwords infected with malware.” Wagenius was stationed at Fort Cavazos, formerly known as Fort Hood, in Killeen, Texas.

Connected to earlier case

The FBI was already on edge from the “growing list of cybersecurity issues” as hack attacks have become a hobby for opportunistic people with access to computers. There are off the shelf hacking tools freely available with lots of social media instruction videos on how to use them.

Federal officials don’t want to make a big deal of the fact we have criminals in the Army. Especially not after New Year’s Day revealed an ISIS sleeper cell terrorist and a suicidal Green Beret. Both were in the same branch of the service.

As DOJ leadership is about to be replaced with President Trump’s hand picked officials, federal prosecutors announced Wagenius’ involvement with “an earlier case involving two alleged hackers, Connor Moucka and John Binns.

Previously charged with trying to sell confidential phone records of both Donald Trump and Kamala Harris.

After being arrested for trying to shake down Trump and Kamala Harris, the Army soldier was “later extradited to Washington state.” His alleged co-conspirators “were charged with breaching cloud-computing platform Snowflake, resulting in the theft of sensitive data from numerous corporate clients.

While they’ve probably known about it for a while, “this marks the first time prosecutors have publicly tied Wagenius to the Snowflake data breaches, an attack that compromised sensitive information from over 160 companies.

They didn’t want the world to know he was in the Army when he did it. Security insider and journalist Brian Krebs was way ahead of them. “Krebs reported in November that Wagenius allegedly threatened to release stolen data, including call logs of Vice President Kamala Harris and President-elect Donald Trump if Canadian authorities did not release Moucka.

Sponsored
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Article
U-Haul

Citizen Tips Police to U-Haul Stuffed With Chinese Illegals

Next Article
Biden

Biden Bombshell Comes Out Moments After Trump Sworn In

Related Posts