⏱ 3 min read
Cameron Curry, 27, of Charlotte, is staring down a lengthy prison sentence after a federal jury found him guilty of trying to bleed a major international tech firm for $2.5 million. Between December 11, 2023, and January 24, 2024, Curry, a former data analyst with inside access, allegedly threatened to unleash a torrent of stolen employee data and corporate secrets unless the company paid up in cryptocurrency. It’s a classic case of a disgruntled ex-employee looking to cash in on a mess.
Prosecutors laid out a paper trail of over 60 menacing emails sent by Curry, operating under the online handle “Loot.” The messages weren’t vague warnings, they were specific, detailing the sensitive Personally Identifiable Information (PII) Curry pilfered during his six-month employment. He knew exactly what he had and wasn’t afraid to say it – a clear promise to expose the company if his demands weren’t met. The scheme unfolded after Curry learned his contract wasn’t being renewed.
Federal agents raided Curry’s Charlotte residence on January 24th, recovering electronic devices that reportedly confirmed the extortion plot. Trial evidence indicated Curry’s intent wasn’t just about the money; he aimed to publicly embarrass the company by reporting a data breach and releasing the stolen information, inflicting maximum reputational damage.
Curry was convicted on six counts of transmitting interstate communications with intent to extort. Each count carries a maximum penalty of five years, meaning Curry could be facing up to 30 years in prison. U.S. Attorney’s Office for the Western District of North Carolina and the FBI teamed up to build the case, and Judge Kenneth D. Bell presided over the three-day trial. A sentencing date has not yet been scheduled.
📋 Key Facts
- Crime: Cybercrime
- Defendant: North Carolina
- Location: US
- Source: U.S. Department of Justice
