DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Throwing caution to the winds, “kiberphant0m” tries to extort AT&T with Trump and Harris call logs

Posted on November 7, 2024August 4, 2025 by Dissent

While many of us were waking up to the election results yesterday, at least one person was busy trying to extort AT&T using the president-elect and current vice president’s call logs.

Post by kiberphant0m on BreachForums, November 6, 2024. Image: DataBreaches.net.

In their post, “kiberphant0m” posted this demand concerning AT&T call logs:

TRUMP & Vice President of the United States CALL LOGS — OFFICIAL WARNING TO ATNT

If you do contact me or Reddington by Sunday, consider all of the Data to be leaked. You have until Sunday to contact me or Reddinton. In the event you do not reach out to us @ATNT all presidential government call logs will be leaked. You don’t think we don’t have plans in the event of an arrest? Think again.

I’d highly advise you to contact us.

You can reach out to me on my telegram or on-site pm’s.

Have fun with the media coverage, shouldn’t of dragged it on.

#FREEWAIFU
#FREEWAIFU
#FREEWAIFU
#FREEWAIFU
#FREEWAIFU

Hours later, “Reddington,”  responded to the thread, “Please do not contact me. I want no part in this. Thank you.” Reddington had previously been involved in extortion negotiations between hackers and AT&T in July. At the time, Reddington claimed that he had been contacted by a hacker in Turkey and asked to negotiate with AT&T to get the telecom to pay for the deletion of the data that had been stolen. AT&T reportedly paid $370,000 to get the hacker to delete the data. Reddington told WIRED that he did receive a fee for his services, but the fee was paid by AT&T.  Perhaps kiberphant0m hoped Reddington would serve as an intermediary again.

Kiberphant0m’s post also mentioned “Waifu,” whose real name is Alexander “Connor” Moucka. Moucka, who was also known as “Judische,” was arrested in Canada on October 30 at the request of the U.S. and is awaiting an extradition case relating to charges he was responsible for numerous clients of Snowflake being compromised, including big firms like AT&T. It seems likely that Canada will promptly cooperate with the extradition request.

In any event, now “kiberphant0m” is making its own bold move. Will Trump’s people or Harris’s people even respond at all? Or AT&T? Sample data that were presented as numbers from 2022 have been checked and there is some reporting indicating that those are numbers linked to Trump, Harris, and people who call them or whom they called.

This is a developing story….

This post was updated to clarify that it is AT&T targeted using the Trump and Harris call logs to extort them.

Category: Government SectorHackOf Note

Post navigation

← DataBreach.com Emerges as Alternative to HaveIBeenPwned
Germany drafts law to protect researchers who find security flaws →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.