Ex-Digital River Employee Avoids Jail, Gets Probation for $5,895 Ethereum Cryptojacking Scheme
Former IT Worker Ordered to Pay $45,000 After Unlawful Use of Company Cloud Resources
In a case that underscores the persistent vulnerabilities in corporate digital security, a former Digital River employee has been sentenced for a year-long cryptojacking scheme that netted him $5,895 in Ethereum. Joshua Paul Armbrust, 45, avoided prison time and was instead sentenced to three years’ probation by US District Judge Jerry Blackwell on Tuesday. The sentencing follows Armbrust's guilty plea in April to a felony computer fraud charge. The case highlights the significant financial disparity between illicit gains and the actual costs inflicted on businesses, with Armbrust ordered to pay more than $45,000 in restitution to his former employer—over seven times the value of the Ethereum he mined. This outcome serves as a critical reminder of the legal and financial perils of unauthorized resource use, even as it raises questions about the motivations behind such cybercrimes.
According to court documents, Joshua Armbrust’s scheme was both simple in its execution and audacious in its duration. After leaving his position at the Minnetonka-based e-commerce and payment processing firm, Digital River, in February 2020, Armbrust retained access to the company’s Amazon Web Services (AWS) credentials. He then proceeded to use these corporate cloud computing resources to mine Ethereum.
The operation was not a brief exploit but a sustained effort. For over a year, Armbrust consistently ran cryptocurrency mining scripts on Digital River’s servers. Court filings note that this activity was primarily conducted during off-hours, specifically between 6 p.m. and 7 a.m., likely in an attempt to avoid immediate detection. This method allowed him to generate a total of $5,895 worth of Ethereum. However, the computing power required for this mining operation incurred substantial costs for Digital River, totaling $45,270 in AWS fees—a stark illustration of how cryptojacking can generate modest profits for the perpetrator while creating massive, disproportionate expenses for the victim.
The scheme was ultimately uncovered during an internal investigation launched by Digital River, which culminated in the company shutting down the unauthorized operations in January. The initial red flag was an unusual and unexplained spike in AWS fees. Corporate investigators traced the source of this anomalous activity back to an IP address linked to Joshua Armbrust.
This discovery revealed the full extent and timeline of the breach, confirming that Armbrust had been actively using company resources long after his employment had ended. The case demonstrates the critical importance of robust internal monitoring systems for cloud infrastructure. Without diligent oversight of usage metrics and costs, such long-term unauthorized access could have continued indefinitely.
The legal response to Armbrust’s actions was severe in its characterization. Assistant US Attorney Jordan Endicott argued that this was far from an impulsive act. In court proceedings, Endicott described the scheme as a “calculated and covert misuse of enterprise-level computing resources for private enrichment.”
The prosecution emphasized the broader implications for corporate security. “The defendant’s conduct strikes at the core of digital trust and security in the modern economy,” Endicott stated. “Companies rely on former employees to act ethically, even after separation, and to respect corporate systems and data. Unauthorized access to corporate cloud infrastructure not only creates financial harm, as in this case, but also exposes sensitive systems to potential compromise and opens the door to more severe cyber threats.” This perspective frames cryptojacking not merely as theft of resources, but as a fundamental breach of trust that can weaken a company's entire security posture.
In contrast to the prosecution's narrative of calculation, defense attorney William Mauzy presented Armbrust as a man acting under duress. Mauzy argued that his client’s conduct was driven by desperation rather than sheer greed. He detailed that Armbrust was facing severe financial pressure while caring for his terminally ill mother, who has since passed away.
The defense also pointed to mitigating factors: Armbrust did not attempt to damage Digital River’s systems, made no sophisticated effort to hide his actions (as evidenced by the traceable IP address), and accepted full responsibility for the losses he caused. At the time of his indictment in November 2024, Armbrust was living in Orr, Minnesota. He has since relocated to St. Paul, where he now works in the insurance sector. Both the prosecution and defense ultimately recommended a probation sentence under the plea deal, citing his previously clean record and his cooperation with authorities.
The Armbrust case is a single example of a widespread cyber threat known as cryptojacking or malicious cryptomining. This type of attack involves hackers secretly using a victim's computing power to mine cryptocurrency without their knowledge or consent.
Historically, tools like Coinhive exemplified this threat vector. Before its shutdown in March 2019, Coinhive was a widely used script for mining Monero directly within web browsers and was estimated to be involved in more than two-thirds of all such attacks at its peak. While Coinhive's closure reduced one major avenue for these attacks, the fundamental technique persists. The shift from infecting websites with browser-based scripts to compromising cloud credentials, as seen in the Digital River case, shows how attackers adapt their methods to available opportunities.
In delivering the sentence, Judge Jerry Blackwell remarked on the squandered opportunity represented by Armbrust’s actions. The judge noted that Armbrust’s technical talents could have been applied lawfully, pointing to the wasted potential of using such skills for a criminal scheme.
The sentence of three years’ probation, coupled with the full restitution order, sends a mixed message. While it acknowledges the defendant’s personal circumstances and cooperation, it also establishes a precedent that such crimes, even when financially motivated by personal hardship, will not be taken lightly by the judicial system. The outcome underscores that legal consequences extend beyond prison walls and can include long-term financial obligations and supervised probation.
The resolution of this case carries several important takeaways for both corporations and participants in the cryptocurrency space.
For businesses, especially those reliant on cloud infrastructure like AWS, Google Cloud, or Microsoft Azure, this incident is a stark warning. It highlights the critical need for robust offboarding procedures that immediately revoke all system access upon an employee's departure. Furthermore, continuous monitoring of cloud spending and resource usage is no longer optional but a necessity for early detection of unauthorized activity. Implementing stricter access controls and conducting regular security audits can prevent former employees or external bad actors from exploiting retained credentials.
For the cryptocurrency industry, cases like this can contribute to negative regulatory and public perception. While cryptocurrency mining is a legitimate technological process central to Proof-of-Work blockchains like Ethereum (at the time of the offense), its association with illegal activities like cryptojacking can fuel skepticism among regulators and traditional institutions.
The case of Joshua Armbrust serves as a multifaceted cautionary tale. For individuals, it is a warning that unauthorized use of computing resources for cryptocurrency mining is a serious federal crime with significant financial and legal repercussions, regardless of the immediate profit gained. Personal desperation, while a mitigating factor in sentencing, does not absolve one of responsibility.
For corporations, it is a pressing reminder to fortify their digital perimeters. The security principle of "least privilege" and timely deprovisioning of access are essential defenses against insider threats—whether current or former.
Finally, for the crypto community at large, this event underscores the importance of promoting lawful and ethical participation in digital asset ecosystems. As blockchain technology continues to evolve and integrate into the global economy, maintaining its integrity through legal compliance is paramount for its long-term success and adoption.
Moving forward, stakeholders should watch for how corporations enhance their cloud security postures in response to such incidents and how law enforcement continues to handle similar cases of digital asset-related fraud. The line between innovative use of technology and criminal exploitation remains thin, and vigilance is required on all sides to ensure it is not crossed.