Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/13/2015
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Six Nigerian Nationals Extradited from South Africa to Mississippi to Face Fraud Charges

Six Nigerian nationals were extradited from South Africa to Gulfport, Mississippi, to face a nine-count federal indictment in the Southern District of Mississippi alleging various Internet fraud schemes.  A total of 20 defendants are charged in this case.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Gregory K. Davis of the Southern District of Mississippi made the announcement.

Oladimeji Seun Ayelotan, 30; Rasaq Aderoju Raheem, 31; Olusegun Seyi Shonekan, 33; Taofeeq Olamilekan Oyelade, 30; Olufemi Obaro Omoraka, 26; and Anuoluwapo Segun Adegbemigun, 39, are charged along with 15 others in an Oct. 7, 2014, indictment with conspiracy to commit mail fraud, wire fraud, bank fraud, conspiracy to commit identity theft, use of unauthorized account access devices, theft of U.S. government funds and conspiracy to commit money laundering.  The charges stem from the defendants alleged participation in numerous Internet-based complex financial fraud schemes, including romance scams, re-shipping scams, fraudulent check scams and work-at-home scams, as well as bank, financial and credit card account takeovers.

According to the allegations in the indictment, from as early as 2001, the defendants identified and solicited potential victims through online dating websites and work-at-home opportunities.  In some instances, the defendants allegedly carried on fictitious online romantic relationships with victims for the purpose of using the victims to further certain objectives of the conspiracy.  For example, the indictment alleges that the defendants convinced victims to ship and receive merchandise purchased with stolen personal identifying information (PII) and compromised credit card and banking information, to deposit counterfeit checks, and to transfer proceeds of the conspiracy via wire, U.S. mail or express delivery services. 

To date, defendants Teslim Olarewaju Kiriji, 30; Olutoyin Ogunlade, 41; and Dennis Brian Ladden, 75, have been convicted of offenses relating to their roles in the schemes.  Defendants Susan Anne Villeneuve, 49; and Genoveva Farfan, 45; Sesan Olumide Farin, 40; Femi Alexander Mewase, 44; Rhulane Fionah Hlungwane, 24; and Adekunle Adefila, 40, are awaiting trial.  The United States is seeking extradition from Nigeria of defendants Kayode Bamidele, Ajayi Oluwaseyi Stephen and Emmanuel Adeniyi Osokomaiya.  Defendants Gabriel Oludare Adeniran and Oduntan Sikiru Lawani remain fugitives.

The charges and allegations in the indictment are merely accusations.  A defendant is presumed innocent until and unless proven guilty. 

This case is being investigated by Homeland Security Investigations (HSI) and the U.S. Postal Inspection Service.  Significant assistance was also provided by the Criminal Division’s Office of International Affairs, the HSI Cyber Crimes Center, HSI Attachés in Pretoria and Dakar, U.S. Marshals Service’s International Investigations Branch and the Southern District of Mississippi, the South African Police Service (SAPS) Directorate of Priority Crimes Investigation (DPCI) Electronic Crimes Unit, the SAPS Interpol Extradition Unit, the South African National Prosecution Authority, and the South African Department of Justice and Constitutional Development.  The case is being prosecuted by Trial Attorney Robert Tully of the Criminal Division’s Organized Crime Gang Section and Assistant U.S. Attorneys Annette Williams and Scott Gilbert of the Southern District of Mississippi.

# # #

If you believe that you may have been a victim of criminal fraud committed by any of the defendants, please go tohttp://www.justice.gov/usao-sdms/scams and complete the questionnaire using the password scams.  Defendants allegedly used the following email addresses and names to perpetuate the scheme:

[email protected]      [email protected]

[email protected]              [email protected]

[email protected]                      [email protected]

[email protected]                 [email protected]

[email protected]                  [email protected]

[email protected]                         [email protected]

[email protected]                       [email protected]

[email protected]              [email protected]

[email protected]                [email protected]

[email protected]                    [email protected]

[email protected]              [email protected]

[email protected]               [email protected]

MATT.MILLER4[email protected]              [email protected]

[email protected]    [email protected]

[email protected]       [email protected]

[email protected]           [email protected]

[email protected]                    [email protected]

[email protected]                         [email protected]             

[email protected]        [email protected]

[email protected]        [email protected]

[email protected]         [email protected]          

[email protected]  [email protected]

[email protected]

Richard Wasser                                               Adeline Piper             

Glenn Sattelberg                                             Folly Edwards

Samuel Maxwell                                              Stacy Adams

Regina Darwin                                                Justin Worsham

Marlon Chase                                                 Karen Robinson

Dickson Jones                                                Mark Miller

Kimberly Faye                                                 Mark Smith

Lorene M. Garrett                                           John Gervino

Mark Gentile                                                   Sarah Powell

Kevin Smith                                                    Anita Lauren

Any information that you provide through the questionnaire may be helpful in the criminal investigation and prosecution of this case.  A federal investigator may contact you with additional questions or to request documents you may have.  Please note that submitting the questionnaire is not a substitute for consulting with your own attorney to determine what actions and remedies may be available to you through civil litigation.  If you have any questions related to this matter that are not addressed at the above websites, you may contact federal law enforcement authorities at [email protected].

Ayelotan Second Superseding Indictment

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8015
PUBLISHED: 2020-04-02
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2020-1927
PUBLISHED: 2020-04-02
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
CVE-2020-8144
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
CVE-2020-8145
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
CVE-2020-8146
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...