Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Nigerian National Extradited to United States on BEC Scam Charges
  • Cyber Attacks
  • Data Breach

Nigerian National Extradited to United States on BEC Scam Charges

6 years ago David Bisson
Nigerian National Extradited to United States on BEC Scam Charges

A Nigerian national entered into the custody of the FBI to face charges of having targeted several U.S. companies with business email compromise (BEC) scams.

On July 3, the U.S. Attorney’s Office for the Northern District of Illinois announced that the United Arab Emirates had expelled Olalekan Jacob Ponle (a/k/a “Mr. Woodbery” and “Mark Kain”), 29, originally of Lagos, after having arrested the Nigerian national a month earlier.

Poole subsequently entered into the custody of the FBI, through whom he was extradited to Chicago in order to face a charge of conspiracy to commit wire fraud.

According to the Department of Justice (DOJ), Poole is alleged to have compromised the email accounts of several companies based in the United States during the first nine months of 2019. He leveraged his unauthorized access to target employees at those organizations with BEC scam emails.

As quoted in the DOJ’s press release:

The emails were nearly identical to prior legitimate emails sent over the company’s email account, but the fraudulent emails instructed victims to wire funds to a bank account that was set up by money mules at the direction of Ponle, the complaint states. Ponle then instructed the mules to convert the fraud proceeds to Bitcoin and send them to a virtual wallet that Ponle owned and operated….

BEC scams have been on the FBI’s radar for some time now. This reality became evident in September 2019 when the law enforcement body announced that BEC ruses had caused more than $26 billion in damages between June 2016 and July 2019. Those damages were the products of over 150,000 incidents that preyed upon individuals spread across all 50 states and 177 countries.

As of this writing, the U.S. District Court of Chicago had scheduled a detention hearing for Ponle on July 9.

The activities of Ponle and attackers like him highlight the need for organizations to detect a BEC scam campaign. They can leverage these recommendations to do so.

The post ” Nigerian National Extradited to United States on BEC Scam Charges” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Encryption, Finance, Goverment, Phishing, TripWire

Continue Reading

Previous Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service
Next Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

18 hours ago [email protected] (The Hacker News)

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT