DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Canadian cybercriminal sentenced to a year in prison for NFT theft scheme

Posted on July 30, 2025July 30, 2025 by Dissent

ALEXANDRIA, Va. – A Canadian was sentenced yesterday to a year in prison for conspiracy to commit wire fraud, wire fraud, and conspiracy to commit aggravated identity theft.

According to court documents, in May 2022, Cameron Albert Redman, 22, of Mississauga, Ontario, formed a scheme to steal non-fungible tokens (NFTs) by gaining unauthorized access to the X accounts of various digital artists. The conspirators used the artists’ online identities to direct the artists’ followers to fraudulent websites. There, victims would seek to claim new NFTs from the digital artists. Though victims thought they were authorizing a transaction to receive NFTs into their digital wallets, they unknowingly enabled the conspirators to remove cryptocurrency and NFTs from their wallets.

Within a few days, Redman and his co-conspirators defrauded over 200 victims and profited over $794,000.

Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia, and Reid Davis, Special Agent in Charge of the FBI Washington Field Office’s Criminal Division, made the announcement after sentencing by U.S. District Judge Leonie M. Brinkema.

The Justice Department’s Office of International Affairs provided substantial assistance to secure the arrest and March 2025 extradition from Portugal of Redman. The Royal Canadian Mounted Police Cybercrime Investigation Team, Central Region, provided valuable assistance in this case.

Assistant U.S. Attorney Zoe Bedell prosecuted the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:25-cr-129.

Source: U.S. Attorney’s Office, Eastern District of Virginia

One year for more than 200 victims?  The prosecution is likely angered by that, as they sought three years plus conditions. In their position on sentencing, filed July 22, they government began its statement thusly:

Cameron Redman is a serial online fraudster. After being incarcerated for a year for stealing $40 million in a SIM swapping attack, he almost immediately returned to online criminal activities. His next round of sophisticated fraud schemes—the crimes at issue here—resulted in financial losses totaling at least hundreds of thousands of dollars to approximately two hundred victims in a remarkably short period of time. He unsuccessfully sought to target even more victims, failing only due to technical difficulties. A Guidelines sentence of 35 months is necessary and appropriate to reflect the seriousness of the defendant’s crimes and deter him from future criminal conduct. Such a sentence will also give the defendant an important opportunity to disconnect from the harmful communities he has found on the internet and take advantage of the Bureau of Prison’s services for rehabilitation.

Redman’s defense responded by portraying Redman as a vulnerable kid who grew up on the internet. Their position statement began:

Cameron Albert Redman stands before this Court, a 22-year-old young man largely raised by the internet. From an early age, Cameron was burdened with instability, emotional abandonment, and mental health struggles that went largely unrecognized and untreated. Isolated and deeply anxious, he sought connection in the only place that seemed to offer it: online. The internet became his escape and, eventually, his community. The internet gave him an identity. It allowed him to form the friendships and relationships that his anxiety and depression wouldn’t allow him to establish in person. It also brought him the attention and admiration he starved for in real life. But while the internet brought Cameron comfort, it also allowed him to engage in virtually unmonitored and increasingly criminal conduct influenced by, and motivated by his intent to impress, his online peers. His conduct was both intentional and illegal. And it resulted in financial harm to real people—not just faceless usernames and account holders. But this Court should evaluate Cameron’s offense conduct, and his appropriate punishment, under the circumstances in which it occurred and through the eyes of a psychologically vulnerable teenager desperate to be seen, accepted, and valued.

That opening paragraph could probably be a template for all cases where a young person has been prosecuted for cybercrime. Should all teens and young adults get light sentences based on that kind of argument if accompanied by a few psychological reports to support it? If judges, with the best of intentions, perhaps, continue to let young people off lightly, where is the deterrent value to other young people?

DataBreaches notes that the judge who sentenced Redman is the same judge who initially sentenced “Pompompurin” (Conor Fitzpatrick)  to time served and who will be re-sentencing Pompompurin after the appeals court held that she abused her discretion in giving him such a light sentence.  Will Redman’s prosecutors appeal her sentence in this case?  They haven’t indicated that they will, but the absence of any quotable statement following the sentence may signal their unhappiness.

Category: Commentaries and AnalysesMiscellaneous

Post navigation

← Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.