Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/26/2018
10:48 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Two Nigerian Citizens Sentenced for Participating in Wire Fraud Scheme Defrauding U.S. Victims of Millions

HOUSTON – Two Nigerian citizens, both of whom reside in Houston, have been ordered to federal prison for perpetuating a wire fraud scheme involving various internet scams, announced U.S. Attorney Ryan K. Patrick. Idowu Olugbenga Temetan aka David Cole, 30, and Adeltilewa Olamigoke Afolabi Ikuejuyone aka Kuffour Duval, 36, previously pleaded guilty to conspiracy to commit wire fraud and three counts of wire fraud. Temetan also admitted to one count of passport forgery. 

Today, U.S. District Judge Sim Lake handed Temetan a 51-month sentence, while Ikuejuyone received a 45-month sentence yesterday. Both defendants were also held jointly and severally liable to pay $187,422.60 in restitution. As both are not U.S. citizens, each are expected to face deportation proceedings following their sentences. 

At Ikuejuyone’s sentencing, the court heard testimony from a relative of one of the victims who testified about the emotional and financial toll the defendant’s criminal actions had taken on their family. During Temetan’s sentencing hearing today, he acknowledged his mistakes and apologized to the victims for his actions. In handing down the sentences, the court noted the defendants engaged in a series of actions over an extended length of time to defraud multiple victims.

From October 2013 until March 2014, Temetan and Ikuejuyone used counterfeit passports to open bank accounts in the greater Houston area. The passports contained photographs of Temetan and Ikuejuyone but utilized the aliases of David Cole and Kuffour Duval, respectively. Both Temetan and Ikuejuyone then worked with others to lure victims into sending money into various bank accounts under their sole ownership and control. These funds were obtained through a variety of internet scams, including lottery scams and business investment scams. Checks or wire transfers were then sent from the victims’ bank accounts to accounts Temetan and Ikuejuyone controlled. Temetan, Ikuejuyone and their co-conspirators would then use the counterfeit passports to retrieve the fraudulently obtained funds.  

Law enforcement has been able to trace at least $4 million to victims, some of whom who reside in Houston, that have been affected by this scheme. The conspiracy resulted in the defrauding of one elderly victim of $3 million alone. After authorities identified this victim, they were able to trace the accounts into which the monies were being deposited. 

Temetan and Ikuejuyone will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.

The U.S. Postal Inspection Service conducted the investigation. Assistant U.S. Attorneys Julie N. Searle and Rick Bennett prosecuted the case.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8015
PUBLISHED: 2020-04-02
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2020-1927
PUBLISHED: 2020-04-02
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
CVE-2020-8144
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
CVE-2020-8145
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
CVE-2020-8146
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...