Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Nebraska Man Sentenced for Crypto Scheme

August 19, 2025
Reading Time: 3 mins read
in News
Nebraska Man Sentenced for Crypto Scheme

In a case that highlights the intersection of technology, finance, and fraud, Charles O. Parks III, a Nebraska man who branded himself as a crypto influencer and “multi-millionaire,” was sentenced to one year in prison for a sophisticated scheme to defraud cloud computing providers. Using aliases and shell companies, Parks illegally acquired over $3.5 million in computing power to mine nearly $1 million in various cryptocurrencies, including Monero (XMR), Ether (ETH), and Litecoin (LTC). This case serves as a stark warning about the deceptive practices used to exploit emerging technologies for personal gain.

Parks’s fraud, which occurred between January and August 2021, involved creating accounts with multiple cloud service providers under aliases and corporate entities like “CP3O LLC” and “MultiMillionaire LLC.” He deceived these companies into granting him vast amounts of computing power and storage without payment. When questioned about unpaid bills and suspicious data usage, Parks deflected inquiries and provided false explanations. For instance, he told one provider that the computing resources were for a “global online training company,” a lie that underscores the audacious nature of his deceit. This level of deception allowed him to access the immense resources necessary for his illicit mining operation.

The core of Parks’s scheme was cryptojacking, where he used the illegally obtained cloud computing resources to mine cryptocurrency. By leveraging the immense processing power of the cloud, he was able to mine various digital currencies at a much faster rate than he could have on his own. This operation was not just about technical exploitation but also about a calculated strategy to profit from stolen resources. The proceeds, worth nearly $1 million, represented a significant gain from a completely fraudulent enterprise. This case illustrates how criminals are increasingly using the anonymity and scale of cloud services to conduct their illegal activities.

After mining the cryptocurrency, Parks engaged in extensive money laundering to obscure the illegal origin of his funds. He used multiple crypto exchanges, online payment services, and even a non-fungible token (NFT) marketplace to convert the digital currency into cash. The laundered money was then used to make extravagant purchases, including a luxury Mercedes-Benz S AMG, high-end jewelry, and first-class travel. These lavish purchases were not just a result of his newfound wealth but were also a key part of his public persona, where he “boasted about his profits” to build credibility as a crypto influencer, further perpetuating his fraudulent image.

Ultimately, Parks’s scheme unraveled, leading to his arrest and a one-year prison sentence. While he faced a potential sentence of up to 20 years, his admission of guilt played a role in the final sentencing. As U.S. Attorney Nocella noted, Parks “branded himself as an innovator and a thought leader, but in the end he was merely a fraudster whose secret to getting rich quick was lying and stealing.” This case serves as a powerful reminder that while technology can enable innovation and wealth, it can also be a tool for sophisticated fraud. It underscores the importance of vigilance for both cloud providers and the public, as criminals will always seek new ways to exploit complex systems for illicit gain.

Reference:

  • Nebraska Man Gets 1 Year Prison for 3.5M Crypto Jacking Scheme
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Glilot Capital Raises 500 Million Fund

Glilot Capital Raises 500 Million Fund

September 18, 2025
Glilot Capital Raises 500 Million Fund

Researchers Uncover Ransomware Links

September 18, 2025
Glilot Capital Raises 500 Million Fund

DOJ Resentences BreachForums Founder

September 18, 2025
RaccoonO365 Phishing Network Down

RaccoonO365 Phishing Network Down

September 17, 2025
Windows 10 Support Ends in 30 Days

Windows 10 Support Ends in 30 Days

September 17, 2025
RaccoonO365 Phishing Network Down

Exchange 2016, 2019 Support Ends Soon

September 17, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial