DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Canadian cybercriminal sentenced to a year in prison for NFT theft scheme

Posted on July 30, 2025July 30, 2025 by Dissent

ALEXANDRIA, Va. – A Canadian was sentenced yesterday to a year in prison for conspiracy to commit wire fraud, wire fraud, and conspiracy to commit aggravated identity theft.

According to court documents, in May 2022, Cameron Albert Redman, 22, of Mississauga, Ontario, formed a scheme to steal non-fungible tokens (NFTs) by gaining unauthorized access to the X accounts of various digital artists. The conspirators used the artists’ online identities to direct the artists’ followers to fraudulent websites. There, victims would seek to claim new NFTs from the digital artists. Though victims thought they were authorizing a transaction to receive NFTs into their digital wallets, they unknowingly enabled the conspirators to remove cryptocurrency and NFTs from their wallets.

Within a few days, Redman and his co-conspirators defrauded over 200 victims and profited over $794,000.

Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia, and Reid Davis, Special Agent in Charge of the FBI Washington Field Office’s Criminal Division, made the announcement after sentencing by U.S. District Judge Leonie M. Brinkema.

The Justice Department’s Office of International Affairs provided substantial assistance to secure the arrest and March 2025 extradition from Portugal of Redman. The Royal Canadian Mounted Police Cybercrime Investigation Team, Central Region, provided valuable assistance in this case.

Assistant U.S. Attorney Zoe Bedell prosecuted the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:25-cr-129.

Source: U.S. Attorney’s Office, Eastern District of Virginia

One year for more than 200 victims?  The prosecution is likely angered by that, as they sought three years plus conditions. In their position on sentencing, filed July 22, they government began its statement thusly:

Cameron Redman is a serial online fraudster. After being incarcerated for a year for stealing $40 million in a SIM swapping attack, he almost immediately returned to online criminal activities. His next round of sophisticated fraud schemes—the crimes at issue here—resulted in financial losses totaling at least hundreds of thousands of dollars to approximately two hundred victims in a remarkably short period of time. He unsuccessfully sought to target even more victims, failing only due to technical difficulties. A Guidelines sentence of 35 months is necessary and appropriate to reflect the seriousness of the defendant’s crimes and deter him from future criminal conduct. Such a sentence will also give the defendant an important opportunity to disconnect from the harmful communities he has found on the internet and take advantage of the Bureau of Prison’s services for rehabilitation.

Redman’s defense responded by portraying Redman as a vulnerable kid who grew up on the internet. Their position statement began:

Cameron Albert Redman stands before this Court, a 22-year-old young man largely raised by the internet. From an early age, Cameron was burdened with instability, emotional abandonment, and mental health struggles that went largely unrecognized and untreated. Isolated and deeply anxious, he sought connection in the only place that seemed to offer it: online. The internet became his escape and, eventually, his community. The internet gave him an identity. It allowed him to form the friendships and relationships that his anxiety and depression wouldn’t allow him to establish in person. It also brought him the attention and admiration he starved for in real life. But while the internet brought Cameron comfort, it also allowed him to engage in virtually unmonitored and increasingly criminal conduct influenced by, and motivated by his intent to impress, his online peers. His conduct was both intentional and illegal. And it resulted in financial harm to real people—not just faceless usernames and account holders. But this Court should evaluate Cameron’s offense conduct, and his appropriate punishment, under the circumstances in which it occurred and through the eyes of a psychologically vulnerable teenager desperate to be seen, accepted, and valued.

That opening paragraph could probably be a template for all cases where a young person has been prosecuted for cybercrime. Should all teens and young adults get light sentences based on that kind of argument if accompanied by a few psychological reports to support it? If judges, with the best of intentions, perhaps, continue to let young people off lightly, where is the deterrent value to other young people?

DataBreaches notes that the judge who sentenced Redman is the same judge who initially sentenced “Pompompurin” (Conor Fitzpatrick)  to time served and who will be re-sentencing Pompompurin after the appeals court held that she abused her discretion in giving him such a light sentence.  Will Redman’s prosecutors appeal her sentence in this case?  They haven’t indicated that they will, but the absence of any quotable statement following the sentence may signal their unhappiness.


Related:

  • IRS’s Top 10 Identity Theft Prosecutions
  • IRS’s Top Ten Identity Theft Prosecutions
  • Leader of International Malvertising and Ransomware Schemes Extradited from Poland to Face Cybercrime Charges
  • Three IRGC Cyber Actors Indicted for ‘Hack-and-Leak’ Operation Designed to Influence the 2024 U.S. Presidential Election
  • As Cybersecurity Awareness Month draws to a close, phishing incidents still pose a challenge
Category: Commentaries and AnalysesMiscellaneous

Post navigation

← Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users
  • New Report Finds One in Two U.S. School Districts Experienced a Cybersecurity Incident in 2025
  • Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos
  • When Miscarriage Is Recast As Murder
  • The Government Uses Targeted Advertising to Track Your Location. Here’s What We Need to Do.
  • Santa Ana homeowner says insurance company used drone to inspect her roof without telling her

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.