Ex-data analyst stole company data in $2.5M extortion scheme
Recorded: March 20, 2026, 9 a.m.
| Original | Summarized |
Ex-data analyst stole company data in $2.5M extortion scheme News Featured ConnectWise patches new flaw allowing ScreenConnect hijacking New DarkSword iOS exploit used in infostealer attack on iPhones Apple pushes first Background Security Improvements update to fix WebKit flaw GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX International joint action disrupts world’s largest DDoS botnets Microsoft: March Windows updates break Teams, OneDrive sign-ins Ex-data analyst stole company data in $2.5M extortion scheme Navia discloses data breach impacting 2.7 million people Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityEx-data analyst stole company data in $2.5M extortion scheme Ex-data analyst stole company data in $2.5M extortion scheme By Sergiu Gatlan March 20, 2026 A North Carolina man was found guilty of extorting a D.C.-based technology company while still being employed as a data analyst contractor. Extortion email sample (Justice Department) Red Report 2026: Why Ransomware Encryption Dropped 38% Related Articles: Brightly Sergiu Gatlan Previous Article Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Popular Stories CISA urges US orgs to secure Microsoft Intune systems after Stryker breach Max severity Ubiquiti UniFi flaw may allow account takeover GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX Sponsor Posts Uncover shadow AI apps, users, and risky data sharing. Get started in 5 min. Secure your AI agents without sacrificing speed. Cut VMware migration time by 60% with Acronis—move workloads faster, with less downtime. Are refund fraud methods targeting your brand? You can monitor the underground for these threats. Overdue a password health-check? Audit your Active Directory for free Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Ex-data analyst Cameron Curry was convicted of an extortion scheme targeting Brightly Software, a SaaS company formerly known as SchoolDude, acquired by Siemens in 2022. The case highlights a significant cybersecurity risk: insider threats leveraging access gained through employment. Curry, motivated by the anticipated non-extension of his contract, utilized his access to Brightly’s payroll information and corporate data to construct an elaborate extortion attempt. He communicated with over 60 Brightly employees via email, threatening to leak sensitive information—including employee PII like names, dates of birth, home addresses, and compensation details—unless he received a $2.5 million ransom. Crucially, he also leveraged threats against the U.S. Securities and Exchange Commission (SEC) regarding non-disclosure of the breach, escalating the pressure. Following these threatening communications, Curry successfully extorted $7,540 in Bitcoin, transferring it to a cryptocurrency wallet. The FBI subsequently seized Curry’s residence and electronic devices, leading to his conviction and a potential sentence of up to 12 years in prison. This case underscores the severe consequences of exploiting corporate data, particularly when fueled by dissatisfaction or a perceived lack of recognition. Furthermore, it demonstrates the potential for individuals to exploit privileged access to inflict significant financial and reputational damage on an organization, necessitating robust internal security protocols and diligent monitoring of employee conduct. Brightly Software had previously suffered another data breach in May 2023, involving the compromise of credentials and personal data from its SchoolDude online platform, highlighting the persistent vulnerability of SaaS companies and the critical importance of proactive data security measures. |