Seattle

Former U.S. Army Soldier Pleads Guilty to Hacking and Extortion Scheme Targeting Telecom Companies

AI Assisted Icon
Published on July 16, 2025
Former U.S. Army Soldier Pleads Guilty to Hacking and Extortion Scheme Targeting Telecom CompaniesSource: Unsplash/ Clint Patterson

A former U.S. Army soldier has entered a guilty plea for his role in orchestrating a cyber extortion scheme targeting telecommunications companies. Cameron John Wagenius, 19, stationed in Texas, was implicated in attacks on at least ten organizations, methodically hacking into databases and threatening to release sensitive data unless paid ransoms.

Employing a hacking tool known as SSH Brute among other methods, Wagenius and accomplices acquired login credentials from protected networks, as per court documents. The criminal activities spanned from April 2023 up to December 18, 2024, while Wagenius actively served in the military. Using Telegram for communication, they coordinated the theft and extortion effort, seeking ransoms totaling at least $1 million.

Following the data breach, the group allegedly threatened telecommunications companies with the release of stolen information on cybercrime forums such as BreachForums and XSS.is. Prosecutors state that the defendants offered the data for sale on these platforms and, in some instances, completed transactions. Authorities also allege that the stolen data was later used in fraudulent activities, including SIM-swapping schemes.

Wagenius has admitted guilt to multiple charges, including conspiracy to commit wire fraud, extortion in relation to computer fraud, and aggravated identity theft, detailed by the U.S. Department of Justice announcement. He is slated to receive his sentence on October 6, 2025, which may result in a substantial span of incarceration, facing up to 20 years for the wire fraud conspiracy and an additional five for computer fraud extortion, not to mention a mandatory two-year sentence for identity theft.

Investigative efforts leading to Wagenius's plea involved multiple agencies, including the FBI and the Department of Defense's Office of Inspector General, with vital assistance from the U.S. Army's Criminal Investigative Division and other cybersecurity organizations. The case is being prosecuted by the U.S. Attorney's Office for the Western District of Washington and the Justice Department’s Computer Crime and Intellectual Property Section. The sentencing, pending before a federal district court judge, will be influenced by the U.S. Sentencing Guidelines among other statutory considerations.