NIGERIANS AMONG CONVICTS IN $215m GLOBAL EMAIL FRAUD

Read Time:3 Minute, 5 Second

Over 1,000 people in 19 different countries lost around $215 million through a large email fraud scheme. Now, several people have been convicted, including some from Nigeria, according to the United States attorney’s office.

On Thursday, the attorney’s office said 25 defendants were convicted on April 24 for their parts in the fraud and money laundering.
This kind of fraud is often calledbusiness email compromise.”

Of the 25, four — Emmauel Okereke, aka Omo Igbo, 42; Olalekan Bashiru, aka Ola Bash, 36; Jeremiah Agina, 29; and Ademola Balogun, 43 — were Nigerian nationals

Another five — Ayobami Osas Christopher, aka Lovely Man, 30; Ayorinde Emmanuel Adebayo, 35; Olabode Bankole, 37; Chukwuemeka Evulukwu, 35; and Kingsley Owusu, 37 — were naturalised US citizens of Nigerian descent.

Oluwafemi Michael Awoyemi, 40, was also named as a defendant in a separate trial of the same crime but it was not stated if he was a Nigerian national or a naturalised US citizen.

According to documents and evidence presented in court, the defendants gained access to email accounts held by individual users and deployed their co-conspirators to monitor the communications and other activities of the individual email users.

After gaining sufficient intelligence, the co-conspirators would send a fraudulent email to either the hacking victim, or to someone communicating with the hacking victim, requesting payment.

Because the co-conspirators were familiar with the victims’ activities, the fraudulent emails were crafted in a way to convince recipients that the request for payment was for legitimate business activities.

Once members of the conspiracy obtained payment from victims, conspiracy members used a web of fraudulently created bank accounts and cash transfer systems to launder and distribute the funds.

Approximately $50 million of the stolen money was used to purchase cashier’s cheques that were presented for payment to the New Dolton Currency Exchange, a Chicago-area money service business owned and operated by co-defendant Lon Goodman, the court heard.

Goodman accepted cashier’s cheques from co-conspirators who presented false identifications or presented cheques payable to others.

He also routinely accepted false know-your-customer (KYC) information and continued doing business with individuals after being warned by banks that cheques were obtained with stolen funds or otherwise returned as fraudulent.

When it became too risky to accept cashier’s cheques in an individual’s name, Goodman would nonetheless accept cheques from those individuals payable to shell companies that those individuals controlled, according to the statement.

International victims were identified in the US, Canada, Mexico, United Kingdom, Germany, Italy, Kuwait, United Arab Emirates, Australia, New Zealand, Kuwait, Malaysia, Panama, Bermuda, Romania, and other countries.

The wire transfers sent by the victims ranged from tens of thousands to millions of dollars. In one instance, a victim business sent $2.7 million to a shell company bank account that was controlled by a conspiracy member.

Among the items seized or subject to forfeiture during the investigation included nearly $1.2 million worth of cashier’s cheques, cryptocurrency, and cash; a Patek Philippe Nautilus watch with a $45,000 value; an Audemars Piguet Royal Oak watch with a $30,000 value; a Richard Mille Felipe Massa watch with a $140,000 value, and a 4,423 square foot residence in Lawrenceville, Georgia.

The US attorney’s office said each defendant’s sentence will be determined by the court after a review of factors unique to the case, including each defendant’s prior criminal record, if any, their role in the offence, and the characteristics of the violation.

The investigations were conducted by the Federal Bureau of Investigation (FBI) Cleveland Division, the US Postal Inspection Service, and the US Border Patrol Sandusky Bay Intelligence Unit.

 

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %