Navigation
Search
|
US Army Soldier Arrested In AT&T, Verizon Extortions
Tuesday December 31, 2024. 10:05 PM , from Slashdot
Roen said that prior to her son's arrest he'd acknowledged being associated with Connor Riley Moucka, a.k.a. 'Judische,' a prolific cybercriminal from Canada who was arrested in late October for stealing data from and extorting dozens of companies that stored data at the cloud service Snowflake. In an interview with KrebsOnSecurity, Judische said he had no interest in selling the data he'd stolen from Snowflake customers and telecom providers, and that he preferred to outsource that to Kiberphant0m and others. Meanwhile, Kiberphant0m claimed in posts on Telegram that he was responsible for hacking into at least 15 telecommunications firms, including AT&T and Verizon. On November 26, KrebsOnSecurity published a story that followed a trail of clues left behind by Kiberphantom indicating he was a U.S. Army soldier stationed in South Korea. Immediately after news broke of Moucka's arrest, Kiberphant0m posted on the hacker community BreachForums what they claimed were the AT&T call logs for President-elect Donald J. Trump and for Vice President Kamala Harris. On that same day, Kiberphant0m posted what they claimed was the 'data schema' from the U.S. National Security Agency. On Nov. 5, Kiberphant0m offered call logs stolen from Verizon's push-to-talk (PTT) customers -- mainly U.S. government agencies and emergency first responders. On Nov. 9, Kiberphant0m posted a sales thread on BreachForums offering a 'SIM-swapping' service targeting Verizon PTT customers. In a SIM-swap, fraudsters use credentials that are phished or stolen from mobile phone company employees to divert a target's phone calls and text messages to a device they control. Read more of this story at Slashdot.
https://yro.slashdot.org/story/24/12/31/1954200/us-army-soldier-arrested-in-att-verizon-extortions?u...
Related News |
25 sources
Current Date
Jan, Mon 6 - 23:13 CET
|