Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security The Military

Hacker In Snowflake Extortions May Be a US Soldier (krebsonsecurity.com) 11

An anonymous reader quotes a report from KrebsOnSecurity: Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but a third suspect -- a prolific hacker known as Kiberphant0m -- remains at large and continues to publicly extort victims. However, this person's identity may not remain a secret for long: A careful review of Kiberphant0m's daily chats across multiple cybercrime personas suggests they are a U.S. Army soldier who is or was recently stationed in South Korea.

Kiberphant0m's identities on cybercrime forums and on Telegram and Discord chat channels have been selling data stolen from customers of the cloud data storage company Snowflake. At the end of 2023, malicious hackers discovered that many companies had uploaded huge volumes of sensitive customer data to Snowflake accounts that were protected with nothing more than a username and password (no multi-factor authentication required). After scouring darknet markets for stolen Snowflake account credentials, the hackers began raiding the data storage repositories for some of the world's largest corporations. Among those was AT&T, which disclosed in July that cybercriminals had stolen personal information, phone and text message records for roughly 110 million people. Wired.com reported in July that AT&T paid a hacker $370,000 to delete stolen phone records.

On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of Kitchener, Ontario, on a provisional arrest warrant from the United States, which has since indicted him on 20 criminal counts connected to the Snowflake breaches. Another suspect in the Snowflake hacks, John Erin Binns, is an American who is currently incarcerated in Turkey. Investigators say Moucka, who went by the handles Judische and Waifu, had tasked Kiberphant0m with selling data stolen from Snowflake customers who refused to pay a ransom to have their information deleted. Immediately after news broke of Moucka's arrest, Kiberphant0m was clearly furious, and posted on the hacker community BreachForums what they claimed were the AT&T call logs for President-elect Donald J. Trump and for Vice President Kamala Harris. [...] Also on Nov. 5, Kiberphant0m offered call logs stolen from Verizon's push-to-talk (PTT) customers -- mainly U.S. government agencies and emergency first responders.
Kiberphant0m denies being in the U.S. Army and said all these clues were "a lengthy ruse designed to create a fictitious persona," reports Krebs.

"I literally can't get caught," Kiberphant0m said, declining an invitation to explain why. "I don't even live in the USA Mr. Krebs." A mind map illustrates some of the connections between and among Kiberphant0m's apparent alter egos.

Hacker In Snowflake Extortions May Be a US Soldier

Comments Filter:
  • Is it just me, or does it seem strange to rail against this hacker when the large corporations involved put their customers at risk? I mean yeah extortion is serious, but let's not overlook the fast and loose way these companies play with our data.
    • We should rail against both.

      You shouldn't leave your front door unlocked, but if you do, that doesn't make it okay for me to rob your house.

    • If you reach over the counter at a hospital and grab patient records off a desk, then sell them, you are a giant fucking dick and don't get to blame the victim. I don't care how easy it was, don't be a dick.

      Can we do better, sure we can, and we can talk about that, but you're trying to deflect from the crime and blame the victim. Fuck off with that.

  • by Anonymous Coward

    Loser with no future attempts to feel important.

    • At first I thought they were attacking snowflakes, aka MAGA supporters that feeling their existence is threatened by woke-ism.

  • But definitely a Russian operative!

  • A careful review of Kiberphant0m's daily chats across multiple cybercrime personas suggests they are a U.S. Army soldier who is or was recently stationed in South Korea.

    Does this Kiberphant0m suffer from schizophrenia or are there two of them /s
    • A careful review of Kiberphant0m's daily chats across multiple cybercrime personas suggests they are a U.S. Army soldier who is or was recently stationed in South Korea.

      Does this Kiberphant0m suffer from schizophrenia or are there two of them /s

      Using they for some rando internet handle you don't know is standard practice for basically the history of talking to strangers on the internet.

      What are you going to do, trade tit for dick pics to prove it? Have you never heard of catfishing? Are so so fucking tarded you think a woman can't break into some poorly secured cloud database instances? Did you not know there are women in the navy? I don't even know where to start with this next generation stupid, you're the reason your generation doesn't get laid

The explanation requiring the fewest assumptions is the most likely to be correct. -- William of Occam

Working...