CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Credential Stuffing Attack on Fantasy Sports Betting Platform

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A Minnesota man, Nathan Austad (online alias “Snoopy”), pleaded guilty to participating in a large-scale credential stuffing attack targeting a fantasy sports and betting platform. The attack compromised over 60,000 user accounts, resulting in financial losses of approximately $600,000 from around 1,600 victims. Austad and his co-conspirators used stolen login credentials to gain unauthorized access, draining account balances and selling access to compromised accounts on online marketplaces. Austad is the third defendant to plead guilty in this case, with two others, Joseph Garrison and Kamerin Stokes, previously convicted. Austad faces up to five years in prison, with sentencing scheduled for April 2026.

Timeline

  1. 15.12.2025 18:45 1 articles · 3h ago

    Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case

    Nathan Austad, 21, of Farmington, Minnesota, pleaded guilty to conspiring to commit computer intrusion in connection with a credential stuffing attack on a fantasy sports and betting platform. The attack compromised over 60,000 user accounts, resulting in financial losses of approximately $600,000 from around 1,600 victims. Austad is the third defendant to plead guilty in this case, with sentencing scheduled for April 2026.

    Show sources

Information Snippets

  • Nathan Austad, 21, of Farmington, Minnesota, pleaded guilty to conspiring to commit computer intrusion in connection with a credential stuffing attack on a fantasy sports and betting platform.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • The attack compromised over 60,000 user accounts, resulting in approximately $600,000 in financial losses from around 1,600 victims.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • Austad and his co-conspirators used stolen login credentials obtained from previous data breaches to gain unauthorized access to user accounts.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • The attackers drained account balances and sold access to compromised accounts on online marketplaces.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • Austad operated an online shop selling compromised accounts and controlled cryptocurrency accounts that received about $465,000 in digital assets, including proceeds from the scheme.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • Investigators found messages where Austad discussed awareness of an active investigation and acknowledged the criminal nature of the activity.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • Two other individuals, Joseph Garrison and Kamerin Stokes, have already pleaded guilty in connection with the same breach.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources
  • Austad faces a maximum sentence of five years in prison, with sentencing scheduled for April 10, 2026.

    First reported: 15.12.2025 18:45
    1 source, 1 article
    Show sources