Man gets 30 months for selling thousands of hacked DraftKings accounts
Overview
A 23-year-old Tennessee man received a 30-month federal prison sentence for selling access to tens of thousands of compromised DraftKings accounts, underscoring the ongoing threat of credential-based attacks across industries handling sensitive consumer data. The case highlights how healthcare practices face identical account takeover risks—threat actors use the same credential stuffing and social engineering tactics to breach patient portals, billing systems, and EHR platforms containing protected health information.
Key Developments
Kamerin Stokes was convicted of trafficking stolen account credentials at scale, demonstrating how cybercriminals monetize unauthorized access through underground marketplaces. While this case involved a sports betting platform, the attack methodology—credential harvesting, account takeover, and bulk resale—mirrors threats targeting healthcare systems daily.
The prosecution demonstrates federal law enforcement's increasing focus on account-based fraud, particularly where attackers compromise platforms storing financial or personal data. For healthcare practices, the parallel is direct: compromised patient portal credentials provide the same unauthorized access to sensitive records, billing information, and identity data that attackers can exploit or resell.
Industry Impact
This case represents a broader pattern of credential-based attacks that cut across all sectors managing consumer accounts. Healthcare organizations face identical risks:
- Patient portal accounts protected only by weak passwords remain vulnerable to credential stuffing attacks using credentials leaked from other breaches
- EHR access credentials sold on dark web marketplaces enable unauthorized PHI access without triggering traditional perimeter defenses
- Business associate accounts compromised through social engineering provide lateral movement opportunities into practice networks
The 30-month sentence reflects growing regulatory consequences for cybercrime, but practices must recognize that preventing unauthorized access is far more cost-effective than responding to breaches. The average data breach costs $9.8M and takes 258 days to identify and contain (IBM Security, 2024)—making proactive access controls essential, not optional.
What This Means for Your Practice
Independent practices should evaluate current account security posture immediately:
- Audit all accounts with PHI access: patient portals, EHR logins, billing systems, and vendor platforms
- Implement multi-factor authentication across all systems handling protected health information
- Monitor for credential exposure: Check if practice email addresses appear in known data breach databases
- Review access logs regularly: Unusual login times, locations, or access patterns indicate potential compromise
- Enforce credential hygiene: Password managers, rotation policies, and no credential reuse across systems
Small practices often assume they're "too small to target," but automated credential stuffing attacks hit systems indiscriminately based on vulnerability, not organization size.
Independent practices should evaluate current account security posture immediately: - Audit all accounts with PHI access: patient portals, EHR logins, billing systems, and vendor platforms - Implement multi-factor authentication across all systems handling protected health information - Monitor for credential exposure: Check if practice email addresses appear in known data breach databases - Review access logs regularly: Unusual login times, locations, or access patterns indicate potential compromise - Enforce credential hygiene: Password managers, rotation policies, and no credential reuse across systems Small practices often assume they're "too small to target," but automated credential stuffing attacks hit systems indiscriminately based on vulnerability, not organization size..
How Patient Protect Helps
Patient Protect's Zero Trust Architecture and Access Management system directly address credential-based threats with 9 defined user roles and granular permissions that limit exposure even if credentials are compromised. ePHI Audit Logging creates immutable per-session access records that detect unauthorized account use in real time.
The platform's Security Alerts provide real-time threat monitoring, while Breach Simulator models credential compromise scenarios against your actual controls to identify gaps before attackers do. Secure Patient Messaging eliminates the need for patients to use vulnerable portal accounts by providing BAA-gated, encrypted communication channels.
The Autonomous Compliance Engine auto-generates access control tasks and tracks completion, ensuring MFA implementation and access review policies stay current without manual oversight.
Starting at $39/month with no contracts, Patient Protect makes enterprise-grade access security accessible to independent practices. Start a free trial at hipaa-port.com or check your risk at patient-protect.com/risk-assessment.
This editorial was generated by AI from publicly available source material and is clearly labeled as such. It does not constitute legal, compliance, or professional advice. Inclusion of any entity does not imply wrongdoing. Patient Protect makes no warranties regarding accuracy or completeness. Verify all information with the original source before relying on it.

