A high school dropout in Canada, a paranoid hacker in Turkey, and a U.S. soldier with aspirations of defecting to Russia—these three unlikely individuals formed the backbone of a hacking operation that stole sensitive mobile data, extorted companies, and triggered concerns at the highest levels of the FBI.
Canadian Connor Moucka, American John Binns, and U.S. soldier Cameron Wagenius are facing charges for their roles in a cybercrime spree that compromised millions of mobile phone records. The stolen data, which included six months’ worth of call logs from AT&T customers, posed a serious threat to U.S. national security, particularly as it could have exposed communications between FBI agents and confidential informants.
While Moucka and Binns focused on hacking and extortion, Wagenius allegedly took a more extreme step—attempting to sell stolen AT&T data to a foreign intelligence service. His online activity, which included searching for ways to defect to Russia, has only intensified concerns about the potential implications of the breach.
The Hackers’ Digital Footprints: Waifu, Irdev, and KiberPhant0m
Each member of this cybercrime ring operated under distinct online aliases:
- Connor Moucka (Waifu)
- John Binns (Irdev)
- Cameron Wagenius (KiberPhant0m)
Their digital lives were steeped in conspiracy theories, extremism, and a shared hostility toward the U.S. government. According to cybersecurity researchers, Moucka and Binns were part of a loosely organized network called “The Com,” a group of young, English-speaking cybercriminals engaged in financially motivated hacking schemes.
They specialized in stealing social media accounts, hacking cryptocurrency wallets, and infiltrating telecom companies. Their communications were often vulgar, violent, and disturbing—Moucka, for instance, allegedly discussed poisoning Black communities and expressed fantasies about mass killings.
Binns, who lived in Turkey, had long believed the CIA and FBI were tracking him. He was even indicted in the U.S. in 2022 for hacking T-Mobile’s systems and stealing the personal data of 76.6 million customers—a breach that later cost the company $350 million in lawsuit settlements.
How the AT&T Hack Unfolded
By 2024, Moucka and Binns rekindled their partnership to target AT&T. After breaching the company’s network, they stole six months’ worth of customer call and text records, an intrusion that sent alarm bells through U.S. intelligence agencies. The stolen data potentially contained sensitive communications between law enforcement officers and their sources, making it an immediate national security threat.
The hackers initially sought ransom payments in exchange for deleting the stolen data. However, when this strategy failed, Wagenius—stationed at Fort Cavazos in Texas—attempted to sell the stolen AT&T data to a foreign government. U.S. prosecutors revealed that he had emailed what he believed was an intelligence agency offering the stolen information.
At the same time, Wagenius’s internet search history revealed troubling signs—he was actively researching how to defect to Russia. His motivations remain unclear, but the combination of insider access, national security risks, and foreign espionage attempts make his involvement one of the most concerning aspects of this case.
From Online Fantasies to Real-World Consequences
While Moucka and Binns lived largely in the digital world, Moucka’s real life painted a starkly different picture.
- He lived with his grandfather, Anthony Przeklasa, in Ontario, Canada.
- He rarely left his bedroom, spending hours staring at his computer monitors.
- His grandfather, unaware of his crimes, believed he was a freelance software developer.
However, behind the screen, Moucka had developed extreme ideologies and a disturbing obsession with violence. His Telegram messages referenced mass shootings, serial killings, and ties to neo-Nazi groups. Despite this, when authorities finally moved in to arrest him, the reality did not match the online bravado—Moucka simply answered the door without resistance.
Canadian authorities were prepared for a violent confrontation, believing he had stockpiled weapons or poison based on his online threats. However, no physical evidence of these threats was found.
As the investigation unfolded, U.S. prosecutors requested Moucka’s extradition, setting a March 21 hearing date in Canada. If convicted, he could face significant prison time in the U.S.
Binns, on the other hand, is currently in a Turkish prison on separate hacking-related charges. Having obtained Turkish citizenship, he is now protected from U.S. extradition, meaning he may never face trial for his crimes in America.
Wagenius, the U.S. soldier who attempted to sell AT&T’s data, has already pleaded guilty and will soon face sentencing. His actions, which straddle the lines between cybercrime and potential espionage, have raised serious concerns within the Pentagon.
The AT&T breach is part of a larger pattern of telecom hacks that have alarmed U.S. intelligence officials. Mobile networks contain critical data on law enforcement, military operations, and even classified communications. A single compromised telecom provider can expose sensitive information on an unprecedented scale.
The FBI, already concerned about the T-Mobile hack in 2021, now faces an even more direct threat—the possibility that its own agents’ communications were exposed in the AT&T breach. This raises questions about whether foreign intelligence agencies may have already obtained classified U.S. government data.
The case of Moucka, Binns, and Wagenius is more than just another cybercrime story—it’s a wake-up call. It reveals how young, disaffected individuals can use the internet to radicalize themselves, form dangerous alliances, and launch attacks with real-world consequences.
- Cybercrime is evolving from financial extortion to national security threats.
- Telecom companies are prime targets, with customer data becoming a valuable weapon.
- Extremist ideologies and cybercrime are becoming increasingly intertwined.
As governments worldwide struggle to contain the growing wave of cyberattacks, this case serves as a stark reminder of the challenges ahead. The FBI and intelligence agencies will need to rethink their approach to both cybersecurity and insider threats, especially when those insiders—like Wagenius—serve in the U.S. military.
With ongoing investigations and trials still unfolding, the question remains: who else is out there, watching, waiting, and preparing for the next cyberattack?