Former U.S. Army Soldier Pleads Guilty to Hacking and Extortion Scheme Targeting Telecommunications Companies

In a significant development highlighting the intersection of military service and cybercrime, former U.S. Army soldier Cameron John Wagenius, 21, has pleaded guilty to orchestrating a sophisticated hacking and extortion scheme targeting multiple telecommunications companies. Operating under the online alias kiberphant0m, Wagenius, while on active duty at Fort Cavazos (formerly Fort Hood) in Texas, conspired with others to infiltrate the networks of at least ten organizations between April 2023 and December 18, 2024.

The Modus Operandi

Wagenius and his co-conspirators employed various techniques to gain unauthorized access to protected computer networks. One notable method was the use of a hacking tool referred to as SSH Brute, designed to perform brute-force attacks on Secure Shell (SSH) protocols, thereby obtaining login credentials. These credentials were then shared and discussed in encrypted Telegram group chats, facilitating further unauthorized access and coordination among the conspirators. ([justice.gov](https://www.justice.gov/opa/pr/former-us-soldier-pleads-guilty-hacking-and-extortion-scheme-involving-telecommunications?utm_source=openai))

Extortion Tactics and Financial Gains

After successfully breaching the networks and exfiltrating sensitive data, the group engaged in extortion tactics. They threatened to publicly release the stolen information unless substantial ransoms were paid. These threats were disseminated both privately and on public cybercrime forums such as BreachForums and XSS.is. The conspirators offered the stolen data for sale, demanding thousands of dollars from potential buyers. In some instances, they successfully sold the data and utilized it to perpetrate additional fraudulent activities, including SIM-swapping attacks. Collectively, Wagenius and his associates attempted to extort at least $1 million from their victims. ([justice.gov](https://www.justice.gov/usao-wdwa/pr/former-us-soldier-pleads-guilty-hacking-and-extortion-scheme-involving?utm_source=openai))

Legal Proceedings and Potential Sentencing

Wagenius has pleaded guilty to multiple federal charges, including conspiracy to commit wire fraud, extortion related to computer fraud, and aggravated identity theft. His sentencing is scheduled for October 6, 2025. He faces a maximum penalty of 20 years in prison for conspiracy to commit wire fraud, up to five years for extortion related to computer fraud, and a mandatory two-year sentence for aggravated identity theft, which must be served consecutively to any other prison time. Additionally, in a separate but related case, Wagenius previously pleaded guilty to two counts of unlawful transfer of confidential phone records information. ([justice.gov](https://www.justice.gov/usao-wdwa/pr/former-us-soldier-pleads-guilty-hacking-and-extortion-scheme-involving?utm_source=openai))

Broader Implications and Security Concerns

This case underscores the growing threat posed by insider actors with access to sensitive systems and information. Wagenius’s actions, conducted while serving in the U.S. Army, highlight the potential risks associated with individuals who exploit their positions for personal gain. The use of encrypted communication channels and the sale of stolen data on cybercrime forums illustrate the evolving tactics employed by cybercriminals to monetize illicitly obtained information.

The Department of Justice, along with the Federal Bureau of Investigation and the Department of Defense Office of Inspector General’s Defense Criminal Investigative Service, conducted a thorough investigation into this case. Their collaborative efforts emphasize the importance of inter-agency cooperation in addressing complex cyber threats. The involvement of the U.S. Army’s Criminal Investigative Division further highlights the military’s commitment to upholding integrity and accountability within its ranks. ([justice.gov](https://www.justice.gov/usao-wdwa/pr/former-us-soldier-pleads-guilty-hacking-and-extortion-scheme-involving?utm_source=openai))

Conclusion

The guilty plea of Cameron John Wagenius serves as a stark reminder of the vulnerabilities that exist within critical infrastructure sectors, such as telecommunications. It also highlights the necessity for robust cybersecurity measures and vigilant monitoring to detect and prevent unauthorized access and data breaches. As cyber threats continue to evolve, both public and private entities must remain proactive in safeguarding sensitive information against malicious actors, regardless of their affiliations or positions.