Ethical Hacking News
Unraveling the Shadows of Cybercrime: Resecurity's Exposé on The Com Collective
A group known as "The Com" has been linked to high-profile hacks, including the Snowflake data breach. The Com collective's activities have significant implications for national security and the cybersecurity landscape. A key member of The Com, John Erin Binns, was associated with the Snowflake breach and is being investigated by Resecurity. Another individual linked to The Com, Cameron Wagenius, used the online alias "Kiberphant0m" and infiltrated telecommunications providers while on active military duty. The Com collective has been known to harass U.S. government personnel and publish stolen information on dark web forums. Resecurity's investigation into Binns' activities raises questions about the company's methods for gathering data and their potential consequences in the public domain.
In the vast expanse of cyberspace, a complex web of actors and agents operates under the radar, driven by the insatiable pursuit of power and information. Among these actors is a group known as "The Com," a collective of hackers and cybercriminals who have garnered significant attention in recent times due to their brazen attacks on high-profile targets. Resecurity, a company specializing in cybersecurity solutions, has recently released 105 pages of communications related to one of the key members of this collective, John Erin Binns.
Binns, a hacker who was previously associated with the Snowflake data breach, which affected numerous high-profile companies and has been regarded as one of the most significant data security incidents of the decade. The breach compromised the call and text message metadata involving nearly all U.S. customers, resulting in an unprecedented request from the U.S. Department of Justice to delay public disclosure due to national security and public safety concerns. Reports later confirmed that AT&T paid a $370,000 ransom to have the stolen data deleted.
Resecurity's investigation into Binns' activities has revealed a complex network of contacts and communications with other individuals involved in cybercrime. One of these individuals is Cameron John Wagenius, a 20-year-old U.S. Army soldier who used the online alias "Kiberphant0m." Wagenius was arrested after infiltrating 15 telecommunications providers while on active military duty, and published stolen AT&T call logs of high-ranking officials, including President Donald Trump and former Vice President Kamala Harris, on dark web forums.
The communications released by Resecurity also reveal attempts by Binns and Wagenius to harass U.S. government personnel, State Department officials, and FBI staff. Notably, "Scattered LAPSUS$ Hunters," a group associated with The Com collective, continued this trend by posting phone numbers and addresses of hundreds of government officials, including nearly 700 from DHS, in October last year.
Resecurity has stated that it will not disclose how it obtained the data related to Binns' communications but confirmed its authenticity through independent verification. This raises questions about the methods used by Resecurity to gather this information, and the potential consequences of revealing such details in the public domain.
The activities of The Com collective have significant implications for national security and the broader cybersecurity landscape. Their obsession with the idea of "mass surveillance" made possible by compromising telecommunications providers and accessing subscriber records is a concerning trend that warrants attention from law enforcement agencies and cybersecurity experts alike.
In recent times, Resecurity has been at the forefront of exposing the activities of cybercriminals and hackers. The company's efforts to shed light on the tactics and methods used by these actors have significant implications for the broader cybersecurity community. As we move forward in this complex landscape, it is essential that we prioritize transparency, collaboration, and a commitment to protecting our digital rights.
Related Information:
https://www.ethicalhackingnews.com/articles/Unraveling-the-Shadows-of-Cybercrime-Resecuritys-Expos-on-The-Com-Collective-ehn.shtml
https://securityaffairs.com/186586/cyber-crime/resecurity-went-on-the-cyber-offensive-when-shiny-objects-trick-shiny-hunters.html
https://www.resecurity.com/en/blog/article/cyber-counterintelligence-cci-when-shiny-objects-trick-shiny-hunters
https://en.wikipedia.org/wiki/Scattered_Spider
https://www.msn.com/en-us/news/us/feds-are-hunting-teenage-hacking-groups-like-scattered-spider-who-have-targeted-1-trillion-worth-of-the-fortune-500-since-2022/ar-AA1Tp2Kl
Published: Tue Jan 6 08:06:52 2026 by llama3.2 3B Q4_K_M