Tuesday, November 12, 2024
HomeCyber Security NewsNigerian National Pleads Guilty for Hacking Business & Individual Emails

Nigerian National Pleads Guilty for Hacking Business & Individual Emails

Published on

Malware protection

 Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities.

This case highlights the global nature of cybercrime and the importance of international cooperation in bringing perpetrators to justice.

Henry Onyedikachi Echefu, originally from Nigeria and residing in South Africa during his criminal activities, has recently faced the consequences of his actions in a United States courtroom.

- Advertisement - SIEM as a Service

Echefu’s journey to accountability began upon his arrival in the United States on November 30, 2023, following his deportation from Canada.

His guilty plea is pivotal in the ongoing battle against cyber fraud.

BEC Scheme

From February to July 2017, Echefu, alongside his accomplices, engaged in a BEC scheme targeting individuals and businesses.

Document
Integrate ANY.RUN in your company for Effective Malware Analysis

Are you from SOC and DFIR teams? – Join With 400,000 independent Researchers

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..


By gaining unauthorized access to email accounts, the conspirators sent fraudulent wiring instructions from “spoofed” emails, tricking victims into transferring money to bank accounts under their control.

These “drop accounts” were the first step in a complex web of financial deception.

The illicit funds in the drop accounts were just the beginning. Echefu and his co-conspirators laundered the stolen money through a series of transactions to obscure its origin.

They attempted to cleanse the proceeds of their crimes by transferring funds between accounts, withdrawing cash, and using cashier’s checks.

Echefu personally managed over $22,000 of the fraudulently obtained money, showcasing his direct benefit from these illegal activities.

The US Attorney’s office has revealed that a Nigerian national has pleaded guilty to his involvement in a business email compromise scheme.

Guilty Plea and Sentencing

Acknowledging his involvement, Echefu has agreed to a plea deal with a restitution payment of at least $199,929 to the victims and a separate money judgment of $22,187.35.

He now faces up to 20 years in federal prison for each charge against him, with sentencing scheduled for May 23, 2024.

This case is a stark reminder of the severe consequences awaiting those who engage in cyber fraud and money laundering.

Investigation and Assistance

The successful apprehension and prosecution of Echefu were made possible through the collaborative efforts of various agencies, including Homeland Security Investigations (HSI) Baltimore, the U.S. Secret Service – Washington Field Office, and the Justice Department’s Office of International Affairs.

Special recognition was given to the Mid-Atlantic El Dorado Task Force and the Department of Justice Canada’s International Assistance Group for their roles in the investigation and extradition processes.

This case underscores the critical importance of international cooperation in combating cybercrime.

United States Attorney Erek L. Barron praised the dedication and hard work of all involved, emphasizing the U.S. justice system’s commitment to holding cybercriminals accountable, regardless of their location.

As the digital landscape continues to evolve, Henry Onyedikachi Echefu’s case serves as a cautionary tale for those considering engaging in cybercrime.

It also highlights the resilience and determination of law enforcement agencies worldwide to pursue justice and protect innocent victims from these increasingly sophisticated schemes.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...