Threat Intelligence

5/25/2017
01:43 PM
50%
50%

3 Nigerian Cyberthieves Sentenced to Total of 235 Years in Prison

Using love-struck girlfriends found on the Internet to help them carry out their schemes, three Nigerian cyberthieves and their cohorts made off with tens of millions of dollars in pilfered goods before they were ultimately sentenced to a collective total of 235 years in prison.

A federal district court sentenced three Nigerian cybercriminals to a collective 235 years in prison for tens of millions of dollars in intended losses via identity theft, credit card fraud, mail fraud, and pilfering government property, the US Department of Justice announced today.

Femi Alexander Mewase, 45, received a 25-year prison sentence; Oladimeji Seun Ayelotan, 30, received a 95-year prison sentence; and Rasaq Aderoju Raheem, 31, was sentenced to 115 years in prison. The three were part of a 20-member gang of cyberthieves, of which six were extradited from South Africa to Mississippi to face charges in the case.

The defendants and their cohorts relied on Internet dating schemes to lure unsuspecting women to carry out their money laundering of counterfeit checks and money orders via MoneyGrams and Western Union transactions, make purchases of electronics and other goods with stolen credit card numbers, and use stolen personal identification information to commander victims' bank accounts, according to the Department of Justice.

The three Nigerians and other group members associated with the cybercrime ring had been conducting their pilfering going back to at least 2001 before they were extradited to the US from South Africa in 2015 to face charges for their crimes.

Read more about the case here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/27/2017 | 1:58:13 PM
Abhorrent Utilization of Innocent People
I, for one, am very pleased at the outcome for sentencing of these cyberthieves. Using unsuspecting innocent people as a means for your illegal activities is deplorable. 
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...
CVE-2018-1841
PUBLISHED: 2018-11-19
IBM Cloud Private 2.1.0 could allow a local user to obtain the CA Private Key due to it being world readable in boot/master node. IBM X-Force ID: 150901.
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.