Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
US soldier linked to Trump call log hack arrested in Texas
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, charged with two counts of selling or attempting to sell confidential phone records without the customer’s authorization.But behind the scant details provided in the charge sheet submitted to the US District Court for the Western District of Washington at Seattle lies a much bigger story, according to cybersecurity journalist Brian Krebs.The phone records Wagenius is charged with selling could include those Vice President Kamala Harris and President-elect Donald Trump, part of a trove of AT&T and Verizon call records leaked in November by a hacker using the moniker ‘Kiberphant0m’.According to Krebs, the authorities now believe Wagenius is Kiberphant0m, one of the main protagonists of the UNC5537 hacking group that carried out a series of attacks on Snowflake customers.Another alleged member of that group, Connor Riley Moucka (aka ‘Judische’) was arrested in Canada in November. A third accused of being involved in the Snowflake incident, US citizen John Erin Binns, was arrested by the Turkish authorities in May in connection with a separate 2021 attack on T-Mobile.In the case against Wagenius, the military connection looks significant. Krebs reported in November that analysis of Kiberphant0m’s online accounts by researchers dating back to early 2022 uncovered hints that he might be a US soldier recently based in South Korea.Researchers including Unit 221B’s Allison Nixon were able to join some of the dots traced by the hacker’s at times careless and boastful online activity across multiple personas and platforms. As documented by Nixon on Bluesky, this included hackers issuing threats to her and other researchers trying to connect online personas to real identities.The evidence found during this research was revealing enough to suggest it was only a matter of time before the real identity of Kiberphant0m was uncovered. Before the Snowflake breach, the company’s name was just another in today’s business supply chain that usually gets almost no attention. Then it turned out that numerous enterprises were using it to store large amounts of sensitive company data.Some of those accounts were protected with nothing more than a password and username, in other words with no multi-factor authentication (MFA) enabled. That gave the hackers an idea: why not scour darknet forums for the passwords and usernames to break into those accounts?This hunch led to an estimated 160 Snowflake customers having the data they stored on the platform breached, including Ticketmaster, Advance Auto Parts, Neiman Marcus and Santander. The criminals demanded ransoms, receiving at least $2.5 million from unnamed victims, it was later alleged in court documents.What was Snowflake’s responsibility in this? Arguably, none. It was up to customers to turn on MFA if they chose to while securing their password credentials. While true, this led to criticism that if there was a way for admins to enforce MFA on their Snowflake users, it wasn’t easy to implement or enabled by default.It’s a good example of grey areas that still afflict the shared responsibility model of cloud security: which security controls should be left to customers, and which are the platform’s job?In September, Snowflake announced that from October all user accounts would have MFA enforced by default with minimum password length upped from eight to fourteen characters.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3631033/us-soldier-linked-to-trump-call-log-hack-arrested-in-texas.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link