Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Nebraska Man Sentenced for Crypto Scheme

August 19, 2025
Reading Time: 3 mins read
in News
Nebraska Man Sentenced for Crypto Scheme

In a case that highlights the intersection of technology, finance, and fraud, Charles O. Parks III, a Nebraska man who branded himself as a crypto influencer and “multi-millionaire,” was sentenced to one year in prison for a sophisticated scheme to defraud cloud computing providers. Using aliases and shell companies, Parks illegally acquired over $3.5 million in computing power to mine nearly $1 million in various cryptocurrencies, including Monero (XMR), Ether (ETH), and Litecoin (LTC). This case serves as a stark warning about the deceptive practices used to exploit emerging technologies for personal gain.

Parks’s fraud, which occurred between January and August 2021, involved creating accounts with multiple cloud service providers under aliases and corporate entities like “CP3O LLC” and “MultiMillionaire LLC.” He deceived these companies into granting him vast amounts of computing power and storage without payment. When questioned about unpaid bills and suspicious data usage, Parks deflected inquiries and provided false explanations. For instance, he told one provider that the computing resources were for a “global online training company,” a lie that underscores the audacious nature of his deceit. This level of deception allowed him to access the immense resources necessary for his illicit mining operation.

The core of Parks’s scheme was cryptojacking, where he used the illegally obtained cloud computing resources to mine cryptocurrency. By leveraging the immense processing power of the cloud, he was able to mine various digital currencies at a much faster rate than he could have on his own. This operation was not just about technical exploitation but also about a calculated strategy to profit from stolen resources. The proceeds, worth nearly $1 million, represented a significant gain from a completely fraudulent enterprise. This case illustrates how criminals are increasingly using the anonymity and scale of cloud services to conduct their illegal activities.

After mining the cryptocurrency, Parks engaged in extensive money laundering to obscure the illegal origin of his funds. He used multiple crypto exchanges, online payment services, and even a non-fungible token (NFT) marketplace to convert the digital currency into cash. The laundered money was then used to make extravagant purchases, including a luxury Mercedes-Benz S AMG, high-end jewelry, and first-class travel. These lavish purchases were not just a result of his newfound wealth but were also a key part of his public persona, where he “boasted about his profits” to build credibility as a crypto influencer, further perpetuating his fraudulent image.

Ultimately, Parks’s scheme unraveled, leading to his arrest and a one-year prison sentence. While he faced a potential sentence of up to 20 years, his admission of guilt played a role in the final sentencing. As U.S. Attorney Nocella noted, Parks “branded himself as an innovator and a thought leader, but in the end he was merely a fraudster whose secret to getting rich quick was lying and stealing.” This case serves as a powerful reminder that while technology can enable innovation and wealth, it can also be a tool for sophisticated fraud. It underscores the importance of vigilance for both cloud providers and the public, as criminals will always seek new ways to exploit complex systems for illicit gain.

Reference:

  • Nebraska Man Gets 1 Year Prison for 3.5M Crypto Jacking Scheme
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Two Arrested Over Nursery Cyber Attack

Two Arrested Over Nursery Cyber Attack

October 8, 2025
Two Arrested Over Nursery Cyber Attack

Y2K38 Bug Is A Security Vulnerability

October 8, 2025
Two Arrested Over Nursery Cyber Attack

Filigran Raises 58 Million Series C

October 8, 2025
Security Firm Exposes Beijing Institute

Zeroday Cloud Hacking Contest Offers $4.5M

October 7, 2025
Security Firm Exposes Beijing Institute

Security Firm Exposes Beijing Institute

October 7, 2025
Security Firm Exposes Beijing Institute

LinkedIn Sues ProAPIs Over Fake Accounts

October 7, 2025

Latest Alerts

Microsoft Ties Storm 1175 To Medusa

Google Chrome RCE Flaw Details Leak

Redis Use After Free Bug Enables RCE

XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

Rhadamanthys Stealer Evolves Again

Subscribe to our newsletter

    Latest Incidents

    DraftKings Warns Of Account Breaches

    Doctors Imaging Data Breach Hits 171K

    Salesforce Refuses To Pay Ransom

    Red Hat Data Breach Escalates Further

    FC Barcelona Instagram Hacked By Scam

    Threat Actors Claim Huawei Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial