
Summary: A US Army soldier, Cameron John Wagenius, was arrested for unlawfully transferring confidential phone records, including call logs of high-profile officials. He is linked to the Snowflake hacking campaign and has been accused of leaking sensitive data from major telecom providers.
Threat Actor: Kiberphant0m | Kiberphant0m
Victim: AT&T and Verizon | AT&T and Verizon
Key Point :
- Wagenius leaked confidential call logs for former President Trump and Vice President Harris.
- He was previously flagged for involvement in the Snowflake hacking campaign.
- Kiberphant0m offered data from the NSA and claimed to hack over 15 telecom providers.
- He maintained a DDoS botnet and discussed SIM-swapping services.
- An indictment alleges his role in the sale and transmission of confidential records.

NEWS BRIEF
A US Army soldier was reportedly arrested Dec. 20 in Texas and charged with two counts of unlawful transfer of confidential phone records.
Cameron John Wagenius, 20, is suspected of leaking presidential call logs belonging to AT&T and Verizon under an online alias of “Kiberphant0m.”
Wagenius was initially flagged as being involved in the Snowflake hacking campaign along with Connor Riley Moucka, also known as “Judische,” who was arrested last October as part of the Snowflake account hacking.
Kiberphant0m reportedly published stolen call logs for former President Donald Trump and Vice President Kamala Harris after Moucka was arrested, as well as offered data schema from the National Security Agency, call logs from US government agencies, and a SIM-swapping Verizon service.
He also posted on Telegram about hacking more than 15 telecom providers and maintaining a distributed denial-of-service botnet.
An indictment alleges that Wagenius was involved in the sale and transmission of confidential phone records; no further details have been released regarding his connection to the Snowflake attacks.
Source:
https://www.darkreading.com/cyberattacks-data-breaches/us-soldier-arrested-in-verizon-at-t-hack