(MENAFN- Live Mint) United States soldier , Cameron John Wagenius, a communications specialist stationed in South Korea, who was arrested last month for trying to sell hacked data from American Telecom companies, has now been linked to the BSNL hack in 2024, according to a Hindustan Times report.
Wagenius was arrested in Texas on December 20. He has now been linked to the major cybersecurity breach at India's state-owned BSNL, the report added citing cybersecurity analysts and publicly available information. The case has brought into the spotlight“cross-continental workings of an underground cybercrime industry”, it added.
Also Read | L&T Chair pushing 90hr workweek earns whopping 535x more than average employee! The Details
The report said that Wagenius is likely to be“kiberphant0m”, who tried to sell 278 GB of sensitive BSNL data for $5,000 on Breached Forums, a popular dark web marketplace in May 2024. This data included BSNL's home location register database, international mobile subscriber identities, and SIM numbers all of which is critical subscriber and infrastructure information.
In May, the hacker had also claimed to have snapshots of BSNL's SOLARIS server and security key data. In the post he said that the data was worth“several million dollars but I'm selling for pretty cheap”.
Also Read | 5 dead, 180,000 being evacuated - see heart-breaking pics of LA wildfires Progress Ongoing
The government had in July 2024 said in Lok Sabha that one of BSNL's servers were breached, and that the Indian Computer Emergency Response Team (CERT-In ) had reported this intrusion and breach on May 20, the report added.
A senior Indian government official told the paper,“We knew about the kiberphant0m account and have been working on it. We didn't know who was responsible for the account. Attribution is very difficult in cyber domain.”
Also Read | Blinkit ups 10-minute delivery game: Laptops, monitors, printers now available 'Cross-Continental Cybercrime Industry'
The report noted that the breakthrough in identifying Wagenius was possible because he was already under the radar in the US. His associate Connor Riley Moucka was also arrested in October, which revealed a "sprawling operation" in which Moucka and another associate, John Erin Binns, allegedly breached at least 10 organisations. They received $2.5 million in extortion payments from three victims.
MENAFN10012025007365015876ID1109075451
Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.