Security News
A Nigerian hacker was sentenced to 36 months in prison in the United States for participating in a scheme that targeted government employees. According to court documents and statements, Ogunremi and co-conspirators perpetrated their scheme from at least July 2013 through December 2013, targeting "U.S. government agencies' email systems and General Services Administration vendors," the U.S. Department of Justice reveals.
A Nigerian national who has more than 2.5 million followers on Instagram, where he flaunts his lavish lifestyle, was extradited from the United Arab Emirates and appeared in court in the United States to face cybercrime-related charges. As part of the scheme, Abbas is said to have provided two bank accounts in Europe to a co-conspirator.
The US has dragged a fancy-pants, Instagram-star, high-fashion-flaunting, alleged Nigerian scammer out of the United Arab Emirates and into Chicago to face charges that he helped launder beaucoup bucks gouged out of businesses in email compromise scams. The DOJ is charging Abbas with allegedly conspiring to launder hundreds of millions of dollars in BEC and other scams that targeted a US law firm's client, a foreign bank and an English Premier League soccer club, among others.
A Nigerian national appeared in federal court in Chicago Friday accused of orchestrating an international cyber fraud scheme that federal prosecutors say defrauded U.S. businesses in six states out of tens of millions of dollars. He appeared in court Friday morning to face a charge of conspiracy to commit wire fraud.
The United States Department of the Treasury's Office of Foreign Assets Control and the Department of Justice this week announced sanctions against six Nigerian nationals for their involvement in business email compromise and romance fraud schemes. The six, namely Richard Uzuh, Micheal Olorunyomi, Alex Ogunshakin, Felix Okpoh, Nnamdi Benson, and Abiola Kayode, engaged in BEC fraud schemes that resulted in American citizens losing over $6 million, the U.S. Treasury says.
The Nigerian business email compromise threat actors referred to as SilverTerrier have intensified assaults on multiple industries and should be considered an established threat, Palo Alto Networks says. SilverTerrier attacks were linked to roughly 400 individual threat actors in 2018, but that number jumped to 480 in 2019.
In its blog post released Tuesday, A Life of Cybercrime: The Inside Story of How a Nigerian Hacker Earned over $100,000, Check Point told the tale of a man referred to as "Dton." Single, 25 years of age, and a resident of Benin City in Southern Nigeria, Dton seems like a model citizen on the surface. Active for more than seven years, Dton has managed to rake in at least $100,000 from his illegal trade and likely several times that amount-a substantial income in light of the minimum wage and average salary in Nigeria, according to Check Point.
A most entertaining piece of threat research from Check Point gives a unique insight into the "Working" life of a Nigerian email spammer who made thousands of dollars from stolen credit cards alone in recent years. Behind that facade of respectability, "Dton" was in fact an email spammer - a spammer working as part of a Nigerian cybercrime syndicate that generates its ill-gotten gains through buying and using stolen credit card details.
Rise and fall of a Nigerian cybercriminal called 'Dton,' who made hundreds of thousands of dollars in a 7-year campaign, outlined in new report. Ever wonder who's behind one of those Nigerian cyber-crime email campaigns asking you to enter into a shady business deal and how they're enacted? In a unique profile, researchers pulled back the curtain on such an attack with a report outlining how a Nigerian cybercriminal made hundreds of thousands of dollars over the course of seven years by targeting people through numerous malicious campaigns.
Cybersecurity firm Check Point Research, in a report shared with The Hacker news, uncovered the digital trail of a Nigerian cybercriminal, who went by the name of "Dton" and targeted hundreds of thousands of people under the moniker of "Bill Henry" by sending them malicious emails with custom-built malware. A multi-stage criminal scheme The operation began with Dton buying stolen credit card details from Ferrum Shop, an online marketplace that sells over 2.5 million stolen credit card credentials, and then charging them each $550 each to fraudulently net more than $100,000 in illicit transactions.