Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

December 21, 2025

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

December 21, 2025

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

December 21, 2025
Facebook X (Twitter) Instagram
Monday, December 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case
News

Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case

Team-CWDBy Team-CWDDecember 20, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A guilty plea has been entered by a Minnesota man accused of participating in a large-scale cyber-attack against a fantasy sports and betting platform, according to US prosecutors.

The case involves a credential stuffing scheme that led to the compromise of tens of thousands of user accounts and significant financial losses for affected customers.

Nathan Austad, 21, of Farmington, Minnesota (also known online as “Snoopy”), admitted in court last Friday to conspiring to commit computer intrusion.

He is the third individual to plead guilty in connection with the hacking campaign. Prosecutors said Austad and his co-conspirators targeted a betting website in November 2022, using stolen login credentials to gain unauthorized access to user accounts.

Court documents show that more than 60,000 accounts were successfully compromised. In many cases, the attackers added new payment methods under their control and drained existing balances.

Roughly $600,000 was stolen from approximately 1600 victims through this process. Access to the hijacked accounts was also sold on online marketplaces specializing in trafficking compromised accounts.

The attack relied on credential stuffing, a technique that uses username and password pairs obtained from previous data breaches. Those credentials were systematically tested against the betting website in the hope that users had reused the same login details. Once access was gained, the accounts were either emptied or sold to third parties.

Prosecutors said Austad operated one such online shop himself and controlled cryptocurrency accounts that received about $465,000 in digital assets, including proceeds linked to the scheme.

Investigators also uncovered messages in which Austad discussed awareness of an active investigation. In one exchange, he commented that participants should have anticipated law enforcement scrutiny, while another message acknowledged the criminal nature of the activity.

Read more on credential stuffing attacks: Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks

Although the affected betting platform was not named in the court filings, the facts align with a November 2022 announcement by DraftKings that around 68,000 user accounts had been compromised in a credential stuffing incident.

Two other individuals tied to that breach, Joseph Garrison and Kamerin Stokes, have already pleaded guilty. Garrison was sentenced to 18 months in prison in early 2024, while Stokes entered his plea in April 2024.

Austad faces a maximum sentence of five years in prison. His sentencing hearing is scheduled for April 10 2026.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleActive Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Next Article Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Team-CWD
  • Website

Related Posts

News

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

December 21, 2025
News

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

December 21, 2025
News

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

December 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.