In a disturbing revelation, U.S. Army soldier Cameron John Wagenius has been arrested and charged with unlawfully transferring confidential phone records, including those allegedly belonging to President-elect Donald Trump and Vice President Kamala Harris. Operating under the online alias “Kiberphant0m,” Wagenius is accused of infiltrating telecommunications firms to obtain and sell sensitive information. This incident brings to light significant concerns about cybersecurity vulnerabilities and the potential misuse of insider access within secure institutions.

The Arrest and Charges

Wagenius was arrested on December 20, 2024, near Fort Cavazos, Texas (formerly known as Fort Hood). He is facing two felony charges for the unlawful transfer of confidential phone records.

Although the indictment does not explicitly name the victims, authorities believe Wagenius operated under the alias “Kiberphant0m” and hacked into over a dozen telecommunications companies, including AT&T and Verizon.

The case has been transferred to the U.S. District Court for the Western District of Washington in Seattle, where Wagenius is expected to be extradited. If convicted, he could face a prison sentence of up to 10 years for his unauthorized actions. His arrest is part of a broader investigation into a series of data breaches, including the high-profile Snowflake data storage hacks. Wagenius is the third person to be arrested in connection with these cyber intrusions. Initially filed in the U.S. District Court for the Western District of Texas, the indictment provides limited details about the specific activities or victims involved.

The “Kiberphant0m” Persona

Kiberphant0m is the online alias of a cybercriminal involved in various hacking activities and data breaches, primarily targeting telecommunications companies. Emerging in early 2024, Kiberphant0m was active on English- and Russian-speaking cybercrime forums, including platforms like BreachForums, Telegram, and Discord. The persona claimed to have hacked over a dozen major firms, including AT&T and Verizon and offered stolen data and unauthorized access to sensitive systems such as government servers, defense contractors, and critical infrastructure.

Among Kiberphant0m’s most notable claims was obtaining and attempting to sell call logs allegedly belonging to President-elect Donald Trump and Vice President Kamala Harris. The persona also boasted about possessing a “spy schema” from the U.S. National Security Agency, reportedly acquired through the Snowflake data breach. Additionally, Kiberphant0m offered a SIM-swapping service targeting Verizon push-to-talk customers, which included U.S. government agencies and emergency responders.

Using multiple aliases like “@cyb3rph4nt0m” on Telegram and “Buttholio” in some chat rooms, Kiberphant0m appeared connected to the UNC5537 hacking group responsible for the Snowflake breach. The persona also used the hashtag #FREEWAIFU, referencing another individual, Alexander “Connor” Moucka, arrested in connection with the Snowflake incident.