Threat Intelligence

5/25/2017
01:43 PM
50%
50%

3 Nigerian Cyberthieves Sentenced to Total of 235 Years in Prison

Using love-struck girlfriends found on the Internet to help them carry out their schemes, three Nigerian cyberthieves and their cohorts made off with tens of millions of dollars in pilfered goods before they were ultimately sentenced to a collective total of 235 years in prison.

A federal district court sentenced three Nigerian cybercriminals to a collective 235 years in prison for tens of millions of dollars in intended losses via identity theft, credit card fraud, mail fraud, and pilfering government property, the US Department of Justice announced today.

Femi Alexander Mewase, 45, received a 25-year prison sentence; Oladimeji Seun Ayelotan, 30, received a 95-year prison sentence; and Rasaq Aderoju Raheem, 31, was sentenced to 115 years in prison. The three were part of a 20-member gang of cyberthieves, of which six were extradited from South Africa to Mississippi to face charges in the case.

The defendants and their cohorts relied on Internet dating schemes to lure unsuspecting women to carry out their money laundering of counterfeit checks and money orders via MoneyGrams and Western Union transactions, make purchases of electronics and other goods with stolen credit card numbers, and use stolen personal identification information to commander victims' bank accounts, according to the Department of Justice.

The three Nigerians and other group members associated with the cybercrime ring had been conducting their pilfering going back to at least 2001 before they were extradited to the US from South Africa in 2015 to face charges for their crimes.

Read more about the case here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/27/2017 | 1:58:13 PM
Abhorrent Utilization of Innocent People
I, for one, am very pleased at the outcome for sentencing of these cyberthieves. Using unsuspecting innocent people as a means for your illegal activities is deplorable. 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11486
PUBLISHED: 2019-04-23
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
CVE-2019-11487
PUBLISHED: 2019-04-23
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hu...
CVE-2018-7576
PUBLISHED: 2019-04-23
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
CVE-2018-8825
PUBLISHED: 2019-04-23
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local).
CVE-2019-10688
PUBLISHED: 2019-04-23
VVX products using UCS software version 5.8.0 and earlier with Better Together over Ethernet Connector (BToE) application version 3.8.0 and earlier uses hard-coded credentials to establish a connection between the host application and device.