Ethical Hacking News
A former U.S. Army soldier may have been behind a series of high-profile hacking incidents that left millions of customer records exposed. As authorities close in on Kiberphant0m, it remains to be seen whether they will finally reveal their true identity and face the consequences of their actions.
Kiberphant0m, an elusive hacker, claims to have stolen sensitive customer information from companies using Snowflake's cloud data storage.Kiberphant0m's hacking career began on BreachForums, a darknet forum for hackers and cybercrime enthusiasts.Investigations suggest Kiberphant0m may be a former U.S. Army soldier stationed in South Korea.Kiberphant0m has been linked to high-profile hacking incidents, including the Snowflake breaches.Kiberphant0m's claims of being employed by HackerOne have raised suspicions.Evidence points to Kiberphant0m using their expertise for personal gain rather than as a legitimate hacker.
In recent months, the hacking community has witnessed the rise of an elusive and skilled hacker known by their handle Kiberphant0m. This mysterious individual has been extorting companies that use the cloud data storage company Snowflake, claiming to have stolen sensitive customer information. However, a careful examination of Kiberphant0m's online activities reveals a more sinister truth: they may be a former U.S. Army soldier stationed in South Korea.
Kiberphant0m's hacking career began on BreachForums, a popular darknet forum for hackers and cybercrime enthusiasts. In January 2024, Kiberphant0m joined the platform under the handle Boxfan, where they quickly gained notoriety for their exceptional skills and audacious claims. Their exploits have been shared across various cybercrime personas, including Telegram and Discord channels.
One of Kiberphant0m's most notable actions was when they claimed to have poisoned Reddit's cache and planned to exploit it further before reporting the vulnerability. This move showcased their confidence in their abilities and their willingness to engage with the hacking community. However, it also sparked concerns among security experts, who began investigating possible ties between Kiberphant0m and a U.S. Army soldier.
A thorough review of Kiberphant0m's online activities reveals connections to several high-profile hacking incidents, including the Snowflake breaches. Investigators discovered that Kiberphant0m had sold data stolen from companies such as AT&T, Verizon, and Naver, a popular search engine in South Korea. The scope of these breaches is staggering, with millions of sensitive customer records exposed.
Kiberphant0m's claims of having been employed by HackerOne, a company that helps technology firms field reports about security vulnerabilities in their products and services, have also raised suspicions. While it is unclear whether this claim is entirely genuine or part of their elaborate ruse, it highlights Kiberphant0m's ability to manipulate online personas and create the illusion of legitimacy.
Furthermore, investigators discovered that Kiberphant0m had claimed ownership of the BreachForums member "Boxfan," whose early posts on the forum featured the Vars_Secc Telegram account in their signature. This connection strengthens the theory that Kiberphant0m may be a former U.S. Army soldier, as the Vars_Secc identity has been linked to a possible past life as a U.S. soldier stationed in South Korea.
However, when confronted with these findings, Kiberphant0m vehemently denied being a U.S. Army soldier or ever being stationed in South Korea. Instead, they claimed that all of this was part of an elaborate ruse designed to create a fictitious persona. They also insisted that it is "impossible" for them to be caught, citing their supposedly impeccable operational security (opssec) measures.
Despite Kiberphant0m's denials, the evidence points to a different story. The connections between Kiberphant0m's various online personas, combined with their impressive hacking skills and audacious claims, paint a picture of an individual who has used their expertise for personal gain.
As authorities close in on Kiberphant0m, it remains to be seen whether they will finally reveal their true identity. However, one thing is clear: the world of cybercrime has just witnessed the emergence of a formidable and cunning hacker with a potentially catastrophic reputation.
Related Information:
https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/
Published: Tue Nov 26 19:26:57 2024 by llama3.2 3B Q4_K_M