Former data analyst convicted for $2.5M extortion of Brightly Software leveraging internal data access
Summary
Hide ▲
Show ▼
A former data analyst contractor for Brightly Software (formerly SchoolDude) was found guilty of extorting the company for $2.5 million using stolen payroll and corporate data after his contract was not renewed. The individual, Cameron Curry (alias "Loot"), exploited his legitimate access to sensitive employee information to threaten data leaks and SEC reporting unless paid. The extortion campaign, which included threats to release PII and false claims about financial discrepancies, led to a Bitcoin payment of $7,540. Curry faces up to 12 years in prison for six counts of interstate extortion. Separately, Brightly disclosed a separate data breach in May 2023 impacting nearly 3 million SchoolDude customers, though this incident was unrelated to Curry’s actions.
Timeline
-
20.03.2026 08:57 1 articles · 3h ago
Former Brightly Software contractor convicted for $2.5M extortion scheme using stolen internal data
Cameron Curry (alias "Loot") was found guilty of extorting Brightly Software for $2.5 million after stealing payroll and corporate data during his contractor tenure. Curry sent over 60 extortion emails to Brightly employees, threatening to leak sensitive employee PII and report the company to the SEC unless paid in Bitcoin. The FBI seized evidence from Curry’s residence in January 2024, and he now faces up to 12 years in prison for six counts of interstate extortion.
Show sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
Information Snippets
-
Cameron Curry, a 27-year-old data analyst contractor (also known as "Loot"), was found guilty of extorting Brightly Software for $2.5 million using stolen payroll and corporate data.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
Curry used his legitimate access to Brightly’s systems between August and December 2023 to steal sensitive documents, including employee PII such as names, dates of birth, home addresses, and compensation details.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
After his contract ended on December 10, 2023, Curry sent over 60 extortion emails to Brightly employees from [email protected], threatening to leak data and report the company to the SEC for allegedly failing to disclose a breach.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
Curry demanded $2.5 million in Bitcoin, with the ransom increasing by $100,000 monthly, and falsely claimed Brightly’s financial discrepancies exceeded $16 million to pressure the company.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
Brightly paid $7,540 in Bitcoin to Curry following the extortion threats. The FBI later seized electronic devices from Curry’s residence on January 24 after Brightly reported the incident.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
Curry was released on bond in January 2024 and now faces up to 12 years in prison for six counts of transmitting interstate communications with intent to extort.
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57
-
Brightly separately disclosed a data breach in May 2023 affecting nearly 3 million SchoolDude customers after attackers breached its systems on April 20, 2023, stealing credentials and personal data (names, email addresses, account passwords, phone numbers).
First reported: 20.03.2026 08:571 source, 1 articleShow sources
- Ex-data analyst stole company data in $2.5M extortion scheme — www.bleepingcomputer.com — 20.03.2026 08:57