Tag: FBI

  • Nigeria ranks 16th in FBI’s list of countries most affected by internet crimes

    Nigeria ranks 16th in FBI’s list of countries most affected by internet crimes

    The FBI’s Internet Crime Complaint Center has released its annual report.

    The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion.

    State-specific statistics have also been released and can be found within the 2020 Internet Crime Report and in the accompanying 2020 State Reports.

    According to the report, Nigeria is ranked 16th worst affected country.

    Other countries that ranked better than Nigeria are Pakistan, China, Columbia, and Hong Kong.

    Apart from Nigeria, South Africa was also listed among the ‘worst’ 20. South Africa rated sixth with 1,754 victims while Nigeria had 443 victims.

    The top three crimes reported by victims in 2020 were phishing scams, non-payment/non-delivery scams, and extortion. Victims lost the most money to business email compromise scams, romance and confidence schemes, and investment fraud. Notably, 2020 saw the emergence of scams exploiting the COVID-19 pandemic. The IC3 received over 28,500 complaints related to COVID-19, with fraudsters targeting both businesses and individuals.

    Infographic depicting the number of complaints to the Internet Crime Complaint Center in 2020 (791,790) compared to 2019 (467,361).
    In addition to statistics, the IC3’s 2020 Internet Crime Report contains information about the most prevalent internet scams affecting the public and offers guidance for prevention and protection. It also highlights the FBI’s work combating internet crime, including recent case examples. Finally, the 2020 Internet Crime Report explains the IC3, its mission, and functions.

    The IC3 gives the public a reliable and convenient mechanism to report suspected internet crime to the FBI. The FBI analyzes and shares information from submitted complaints for investigative and intelligence purposes, for law enforcement, and for public awareness.

    With the release of the 2020 Internet Crime Report, the FBI wants to remind the public to immediately report suspected criminal internet activity to the IC3 at ic3.gov. By reporting internet crime, victims are not only alerting law enforcement to the activity but aiding in the overall fight against cybercrime.

  • Hushpuppi in fresh trouble as FBI links him to ‘biggest bank robbers in the world’

    Hushpuppi in fresh trouble as FBI links him to ‘biggest bank robbers in the world’

    Nigerian Instagram celebrity, Ramon Olorunwa Abbas, a.k.a Hushpuppi, now incarcerated in California as he awaits trial for cyber fraud was linked on Friday by the FBI to North Korean hackers, said to be the biggest bank robbers in the world.

    The Justice Department in a detailed statement released Friday, said Abbas took part in a “North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019.”

    His role was as a collaborator with a North Korean money launderer, Ghaleb Alaumary, based in Mississauga, Ontario, Canada.

    The 37 year-old Alaumary was one of the people charged by the FBI for many criminal schemes. The others are three North Koreans.

    “Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020”, according to the statement.

    “Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

    “With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.

    “Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019”.

    Recall that Abbas already has a case of his own.

    Last year, the U.S. Attorney’s Office in Los Angeles charged him in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

    In a July statement, the Justice Department referred to the Maltese bank attack as “a $14.7 million cyber-heist from a foreign financial institution.”

    “Both the date and amount match that of the attack on Malta’s Bank of Valletta in February 2019”, reported Forbes.

    TheNewsGuru.com, TNG reports that Abbas, 38, was arrested in Dubai last year.

    He arrived in the U.S. on July 3 to face criminal charges over allegations that he made “hundreds of millions of dollars” from business email compromise frauds and other scams.

    His trial was to have commenced late last year, but was delayed by the COVID-19 pandemic.

    Read the full US Justice Department statement on the indictment of three North Korean military hackers involved in cyber heists running into over $1.3billion

    A federal indictment unsealed today charges three North Korean computer programmers with participating in a wide-ranging criminal conspiracy to conduct a series of destructive cyberattacks, to steal and extort more than $1.3 billion of money and cryptocurrency from financial institutions and companies, to create and deploy multiple malicious cryptocurrency applications, and to develop and fraudulently market a blockchain platform.

    A second case unsealed today revealed that a Canadian-American citizen has agreed to plead guilty in a money laundering scheme and admitted to being a high-level money launderer for multiple criminal schemes, including ATM “cash-out” operations and a cyber-enabled bank heist orchestrated by North Korean hackers.

    “As laid out in today’s indictment, North Korea’s operatives, using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash, are the world’s leading bank robbers,” said Assistant Attorney General John C. Demers of the Justice Department’s National Security Division. “The Department will continue to confront malicious nation state cyber activity with our unique tools and work with our fellow agencies and the family of norms abiding nations to do the same.”

    “Today’s unsealed indictment expands upon the FBI’s 2018 charges for the unprecedented cyberattacks conducted by the North Korean regime,” said the FBI Deputy Director Paul Abbate. “The ongoing targeting, compromise, and cyber-enabled theft by North Korea from global victims was met with the outstanding, persistent investigative efforts of the FBI in close collaboration with U.S. and foreign partners. By arresting facilitators, seizing funds, and charging those responsible for the hacking conspiracy, the FBI continues to impose consequences and hold North Korea accountable for its/their criminal cyber activity.”

    “The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” said Acting U.S. Attorney Tracy L. Wilkison for the Central District of California. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

    “This case is a particularly striking example of the growing alliance between officials within some national governments and highly sophisticated cyber-criminals,” said U.S. Secret Service Assistant Director Michael R. D’Ambrosio. “The individuals indicted today committed a truly unprecedented range of financial and cyber-crimes: from ransomware attacks and phishing campaigns, to digital bank heists and sophisticated money laundering operations. With victims strewn across the globe, this case shows yet again that the challenge of cybercrime is, and will continue to be, a struggle that can only be won through partnerships, perseverance, and a relentless focus on holding criminals accountable.”

    The hacking indictment filed in the U.S. District Court in Los Angeles alleges that Jon Chang Hyok (전창혁), 31; Kim Il (김일), 27; and Park Jin Hyok (박진혁), 36, were members of units of the Reconnaissance General Bureau (RGB), a military intelligence agency of the Democratic People’s Republic of Korea (DPRK), which engaged in criminal hacking. These North Korean military hacking units are known by multiple names in the cybersecurity community, including Lazarus Group and Advanced Persistent Threat 38 (APT38). Park was previously charged in a criminal complaint unsealed in September 2018.

    The indictment alleges a broad array of criminal cyber activities undertaken by the conspiracy, in the United States and abroad, for revenge or financial gain. The schemes alleged include:

    Cyberattacks on the Entertainment Industry: The destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for “The Interview,” a movie that depicted a fictional assassination of the DPRK’s leader; the December 2014 targeting of AMC Theatres, which was scheduled to show the film; and a 2015 intrusion into Mammoth Screen, which was producing a fictional series involving a British nuclear scientist taken prisoner in DPRK.

    Cyber-Enabled Heists from Banks: Attempts from 2015 through 2019 to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta, and Africa by hacking the banks’ computer networks and sending fraudulent Society for Worldwide Interbank Financial Telecommunication (SWIFT) messages.

    Cyber-Enabled ATM Cash-Out Thefts: Thefts through ATM cash-out schemes – referred to by the U.S. government as “FASTCash” – including the October 2018 theft of $6.1 million from BankIslami Pakistan Limited (BankIslami).

    Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies from 2017 through 2020 involving the theft of sensitive data and deployment of other ransomware.

    Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications from March 2018 through at least September 2020 – including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale – which would provide the North Korean hackers a backdoor into the victims’ computers.

    Targeting of Cryptocurrency Companies and Theft of Cryptocurrency: Targeting of hundreds of cryptocurrency companies and the theft of tens of millions of dollars’ worth of cryptocurrency, including $75 million from a Slovenian cryptocurrency company in December 2017; $24.9 million from an Indonesian cryptocurrency company in September 2018; and $11.8 million from a financial services company in New York in August 2020 in which the hackers used the malicious CryptoNeuro Trader application as a backdoor.

    Spear-Phishing Campaigns: Multiple spear-phishing campaigns from March 2016 through February 2020 that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, the U.S.Department of State, and the U.S. Department of Defense.

    Marine Chain Token and Initial Coin Offering: Development and marketing in 2017 and 2018 of the Marine Chain Token to enable investors to purchase fractional ownership interests in marine shipping vessels, supported by a blockchain, which would allow the DPRK to secretly obtain funds from investors, control interests in marine shipping vessels, and evade U.S. sanctions.

    According to the allegations contained in the hacking indictment, which was filed on Dec. 8, 2020, in the U.S. District Court in Los Angeles and unsealed today, the three defendants were members of units of the RGB who were at times stationed by the North Korean government in other countries, including China and Russia. While these defendants were part of RGB units that have been referred to by cybersecurity researchers as Lazarus Group and APT38, the indictment alleges that these groups engaged in a single conspiracy to cause damage, steal data and money, and otherwise further the strategic and financial interests of the DPRK government and its leader, Kim Jong Un.

    Money Launderer Charged in California and Georgia

    Federal prosecutors today also unsealed a charge against Ghaleb Alaumary, 37, of Mississauga, Ontario, Canada, for his role as a money launderer for the North Korean conspiracy, among other criminal schemes. Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020. Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

    With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018. Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019. Last summer, the U.S. Attorney’s Office in Los Angeles charged Abbas in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

    Accompanying Mitigation Efforts

    Throughout the investigation, the FBI and the Justice Department provided specific information to victims about how they had been targeted or compromised, as well as information about the tactics, techniques, and procedures (TTPs) used by the hackers with the goals of remediating any intrusion and preventing future intrusions. That direct sharing of information took place in the United States and in foreign countries, often with the assistance of foreign law enforcement partners. The FBI also collaborated with certain private cybersecurity companies by sharing and analyzing information about the intrusion TTPs used by the members of the conspiracy.

    In addition to the criminal charges, the FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, in collaboration with the U.S. Department of Treasury, today released a joint cybersecurity advisory and malware analysis reports (MARs) regarding North Korean cryptocurrency malware. The joint cybersecurity analysis and MARs highlight the cyber threat North Korea – which is referred to by the U.S. government as HIDDEN COBRA – poses to cryptocurrency and identify malware and indicators of compromise related to the “AppleJeus” family of malware (the name given by the cybersecurity community to a family of North Korean malicious cryptocurrency applications that includes Celas Trade Pro, WorldBit-Bot, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale). The joint cybersecurity advisory and MARs collectively provide the cybersecurity community and public with information about identifying North Korean malicious cryptocurrency applications, avoiding intrusions, and remedying infections.

    The U.S. Attorney’s Office and FBI also obtained seizure warrants authorizing the FBI to seize cryptocurrency stolen by the North Korean hackers from a victim in the indictment – a financial services company in New York – held at two cryptocurrency exchanges. The seizures include sums of multiple cryptocurrencies totalling approximately $1.9 million, which will ultimately be returned to the victim.

    Jon, Kim, and Park are charged with one count of conspiracy to commit computer fraud and abuse, which carries a maximum sentence of five years in prison, and one count of conspiracy to commit wire fraud and bank fraud, which carries a maximum sentence of 30 years in prison.

    In relation to the case filed in Los Angeles, Alaumary has agreed to plead guilty to one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison.

    The charges contained in the indictment are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt.

    The investigation of Jon, Kim, and Park was led by the FBI’s Los Angeles Field Office, which worked closely with the FBI’s Charlotte Field Office. The U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center provided substantial assistance. The FBI’s Cyber Division also provided substantial assistance.

    The investigations of Alaumary were conducted by the U.S. Secret Service’s Savannah Field Office, FBI’s Los Angeles Field Office, and the U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center. The FBI’s Criminal Investigative Division also provided substantial assistance.

    The case against Jon, Kim, and Park is being prosecuted by Assistant U.S. Attorneys Anil J. Antony and Khaldoun Shobaki of the Cyber and Intellectual Property Crimes Section, with substantial assistance from Trial Attorney Scott Claffee of the Department of Justice National Security Division’s Counterintelligence and Export Control Section.

    Assistant U.S. Attorneys Antony and Shobaki are also prosecuting the case against Alaumary, in which the U.S. Attorney’s Office for the Southern District of Georgia and the Criminal Division’s Computer Crimes and Intellectual Property Section (CCIPS) provided substantial assistance. Assistant U.S. Attorneys Antony and Shobaki, along with Assistant U.S. Attorney Jonathan Galatzan of the Asset Forfeiture Section, also obtained the seizure warrants for cryptocurrency stolen from the financial services company in New York.

    The Criminal Division’s Office of International Affairs provided assistance throughout these investigations, as did many of the FBI’s Legal Attachés, as well as foreign authorities around the world. Numerous victims cooperated and provided valuable assistance.

  • ‘Armed protests’ planned across U.S. ahead of Biden’s inauguration – FBI

    ‘Armed protests’ planned across U.S. ahead of Biden’s inauguration – FBI

    Extremists are calling on Trump supporters to “storm” the U.S. Capitol again and stage “armed protests” at state government buildings across the country – including in New York – in the lead-up to President-elect Joe Biden’s inauguration, according to the FBI.

    An internal FBI bulletin obtained by ABC News warns that the armed actions are being planned “at all 50 state capitols” between Jan. 16 and Jan. 20.

    The U.S. Capitol, which has been under tight security since Wednesday’s deadly pro-Trump attack, faces threats of more armed protests starting Jan. 17 through Inauguration Day, according to the bulletin.

    A far-right group that was not identified by name in the bulletin has reportedly called for a particularly violent “storming” of federal and state government buildings in the event that President Donald Trump is removed from office before Biden’s inauguration, amid growing momentum on Capitol Hill for impeachment or an invocation of the 25th Amendment.

    “They have warned that if Congress attempts to remove POTUS via the 25th Amendment, a huge uprising will occur,” the bulletin reportedly states.

    The FBI did not return a request for comment on Monday.

    It is not clear from the bulletin how large the suspected actions will be.

    A poster circulating on Parler, a social media platform used by the far-right, called on followers to stage an “armed march on Capitol Hill & all state capitols” on Jan. 17.

    “Refuse to be silenced,” blared the poster, a screen-grab of which was obtained by the Daily News before Parler was shut down Sunday by its web host.

    A Parler user who shared the poster captioned it with a hashtag saying “boogaloo,” a call to arms used by a white supremacist group that advocates a second civil war to overthrow the U.S. government.

    At least 10,000 National Guard troops will be in Washington by this Saturday to help with security at the U.S. Capitol through Biden’s Jan. 20 inauguration.

    The rumblings of more far-right violence come as House Democrats are pushing full steam ahead to impeach Trump for inciting last Wednesday’s assault on the Capitol, which left a police officer and at least four other people dead.

    The pro-Trump rioters invaded the Capitol after the president told them at a massive rally outside the White House to “fight like hell” to stop the congressional certification of Biden’s election.

    Trump has not apologised for stoking the insurrection, though he admitted for the first time in the wake of the attack that he lost the Nov. 3 election and that Biden would be inaugurated as the next president

  • Democrats ask FBI to probe Trump over Georgia phone call

    Democrats ask FBI to probe Trump over Georgia phone call

    Two Democratic members of the U.S. House on Monday asked the Federal Bureau of Investigation (FBI) to open a probe into outgoing President Donald Trump’s leaked phone call that asked an official of Georgia State to find votes for himself.

    “As members of Congress and former prosecutors, we believe Donald Trump engaged in solicitation of, or conspiracy to commit, a number of election crimes,” Ted Lieu and Kathleen Rice wrote in their letter to FBI Director Christopher Wray.

    “We ask you to open an immediate criminal investigation into the president,” they added.

    During the one-hour phone call, Trump is heard pressuring Georgia Secretary of State Brad Raffensperger to find 11,780 votes in order to beat his Democratic opponent Joe Biden to gain victory in Georgia for the 2020 presidential election.

    Raffensperger, however, responds, “Mr. President, the challenge that you have is, the data you have is wrong,” after Trump asks him to announce he has “recalculated” the vote count.

    The two lawmakers said “the evidence of election fraud by Mr. Trump is now in broad daylight,” adding: “Given the more than ample factual predicate, we are making a criminal referral to you to open an investigation into Mr. Trump.”

    Despite Biden’s victory in Nov. 3 elections, Trump has so far refused to concede in the race, while he has spent the last two months challenging the result.

    As Democratic Rep. Alexandria Ocasio-Cortez of New York said Sunday that Trump’s conduct in the phone call was “impeachable,” it reminded many of his phone call with Ukrainian President Volodymyr Zelensky in July 2019, asking him to investigate Biden and his son Hunter.

    That phone call led the House to start a formal impeachment inquiry into Trump in September 2019, but the president was later acquitted by the Senate.

    On Trump’s phone call about Georgia, House Judiciary Committee Chairman Jerrold Nadler said in a statement Sunday that Trump “thinks he can use his office to pressure state officials to change the outcome of the election”.

    “In threatening these officials with vague ‘criminal’ consequences, and in encouraging them to ‘find’ additional votes and hire investigators who ‘want to find answers,’ the President may have also subjected himself to additional criminal liability,” he added.

  • Why I surrendered: Nigerian wanted by FBI for $6m Internet scam opens up

    Why I surrendered: Nigerian wanted by FBI for $6m Internet scam opens up

    Felix Osilama Okpoh, an alleged fraudster on the watch list of the Federal Bureau of Investigations (FBI) has opened up on why he surrendered himself to the Economic and Financial Crimes Commission (EFCC).

    TheNewsGuru.com (TNG) reports Okpoh, who was on August 21, 2019, indicted in the United States District Court, District of Nebraska on charges of conspiracy to commit wire fraud, surrendered to the EFCC on September 18, 2020.

    According to the EFCC, the suspect turned himself in at the Lagos Zonal Office of the Commission in company of his parents, Col. Garuba Okpoh (retd.) and Chief (Mrs.) Justina Okpoh.

    During interrogation, Okpoh said he made the move to surrender himself to the Commission out of respect he had for his parents and his resolve to be morally upright.

    Okpoh, alongside Richard Izuchukwu Uzuh, Alex Afolabi Ogunshakin, Abiola Ayorinde Kayode and Nnamdi Orson Benson, had been declared wanted by the FBI sometime in 2019 for their alleged involvement in a Business Email Compromise (BEC) scheme that defrauded over 70 businesses in the United States of over $6,000,000.00.

    The suspect allegedly provided over 40 bank accounts to his conspirators, which were used to receive fraudulent wire transfers from their victims totaling over $1,000, 000USD.

    The EFCC had since commenced investigation into his involvement in the $6,000,000.00 Internet fraud.

  • $6m Internet scam: Suspect on FBI watch list turns self in [PHOTO]

    $6m Internet scam: Suspect on FBI watch list turns self in [PHOTO]

    One Felix Osilama Okpoh, an alleged fraudster on the watch list of the Federal Bureau of Investigations (FBI) for his involvement in a $6 million Internet fraud has turned himself in for investigation.

    TheNewsGuru.com (TNG) reports the Economic and Financial Crimes Commission (EFCC) made this known on Tuesday, saying it has since commenced investigations into the matter.

    Recall that Okpoh alongside Richard Izuchukwu Uzuh, Alex Afolabi Ogunshakin, Abiola Ayorinde Kayode and Nnamdi Orson Benson were declared wanted by the FBI sometime in 2019.

    They were declared wanted for their alleged involvement in a Business Email Compromise (BEC) scheme that defrauded over 70 businesses in the United States of over $6,000,000.

    Okpoh, the suspect that turned himself in, allegedly provided over forty bank accounts to his conspirators, which were used to receive fraudulent wire transfers from their victims totalling over $1,000,000.

    He was on August 21, 2019 indicted in the United States District Court, District of Nebraska on charges of conspiracy to commit wire fraud.

    https://www.instagram.com/p/CFcF-LyA4nu/

  • Alleged fraud: More troubles for Hushpuppi as FBI uncovers fresh evidence

    Alleged fraud: More troubles for Hushpuppi as FBI uncovers fresh evidence

    Suspected internet fraudster, Ramon Abbas, popularly called Hushpuppi may face fresh charges in the United States after the Federal Bureau of Investigations (FBI) unveiled how he allegedly laundered unemployment benefits of Americans.

    Abbas was arrested in Dubai last June and immediately flown to the US to face a four-count charge of conspiracy to commit wire fraud, money laundering conspiracies, international money laundering and engaging in monetary transactions in property derived from specified unlawful activity.

    The Nigerian pleaded not guilty to the charges during his initial court appearance in Chicago in July.

    He has since been transferred to California with October 13 set for his trial.

    The FBI, in an affidavit filed on September 14, with the United States District Court, Central District of California, alleged that Hushpuppi using his email address, registered on a website whizzlog.com (“Whizzlog”) which is a marketplace for buying US Bank Logs to perpetrate fraud.

    The FBI said it found in Abbas’ email address “registration contamination from Whizz Log.”

    Also found therein were “numerous confirmations and receipts of bank logs he purchased.”

    One of the messages cited by the agency read “Your order was successful. You have purchased (the “Financial Institution”) bank log with a balance of $9,839.44. Purchase Price: $955. The bank log details are in your account. Login to your Whizz Log account to view.”

    He allegedly bought a “bank log with a balance of over S9,000 for as low as $900.”

    If convicted of conspiracy to engage in money laundering, Abbas would face a statutory maximum sentence of 20 years in federal prison.

  • VIDEO: How Hushpuppi led us to his Dubai Versace home via Instagram posts – FBI

    VIDEO: How Hushpuppi led us to his Dubai Versace home via Instagram posts – FBI

    A video is trending about how international business email compromise scammer Ramon Abbas, a.k.a Hushpuppi led the FBI to himself via his outlandish posts on Instagram.

    He was arrested in Dubai on 5 June, along with another Nigerian Olalekan Ponle and 10 other suspects.

    In Dubai, Hushpuppi lived at the exclusive Palazzo Versace, while he a global network that used computer intrusions, business email compromise schemes and money laundering to steal hundreds of millions of dollars from companies. He even targeted an English Premier League club.

    Investigators seized nearly $41 million, 13 luxury cars worth $6.8 million, and phone and computer evidence, Dubai Police said in a statement.

    They also uncovered email addresses of nearly 2 million possible victims on phones, computers and hard drives, Dubai authorities said.

    On 2 July, he was extradited to the United States.

    He is now being held in Los Angeles, California, where he will be tried for scams worth $1.5 billion.

  • Internet fraud: EFCC nabs mother, son, girlfriend declared wanted by FBI

    Internet fraud: EFCC nabs mother, son, girlfriend declared wanted by FBI

    The Economic and Financial Crimes Commission (EFCC) has arrested a mother and her son that were declared wanted by the US Federal Bureau of Investigation (FBI) for internet fraud.

    TheNewsGuru.com (TNG) reports that the mother, Dorah Aninah and her son, Kenneth Gift were arrested by the EFCC in Agbor, Delta State alongside Dandy Spice.

    According to the EFCC, the arrest was sequel to a petition from the FBI, and intelligence by operatives of the Commission.

    The trio were arrested for internet fraud, and according to the EFCC, Dandy Spice is girlfriend to Kenneth Gift, who is a 22-year-old Computer Science undergraduate of the University of Port Harcourt.

    Items recovered from them at the point of arrest included a 5-bedroom duplex, Mercedes-Benz CA250, Mercedes-Benz C250, Mercedes Benz GLK 350, laptop computers and mobile phones.

    The suspects have made useful statements and will be charged to court as soon investigations are complete, according to the EFCC.

  • ‘Hushpuppi absolutely not guilty’

    ‘Hushpuppi absolutely not guilty’

    The legal representative to suspected Internet fraudster, Ramon Abbas, also known as Hushpuppi has said the popular Instagram celebrity is absolutely not guilty of charges levelled against him.

    TheNewsGuru.com (TNG) reports Hushpuppi, with over 2.5 million followers on Instagram, was arrested in Dubai and extradited to the United States for prosecution.

    Affidavit filed by the Federal Bureau of Investigation (FBI) alleges that Hushpuppi conspired to launder funds stolen in a $14.7 million cyber-heist from a foreign financial institution.

    The FBI also alleges a New York-based law firm was defrauded of approximately $922,800. Hushpuppi is accused of laundering $396,050 of the funds alongside two co-conspirators.

    https://www.instagram.com/p/BE0OEyBSLXy/?igshid=v9w4m2phefqy

    Perhaps, the most notably of the allegations is that Hushpuppi is involved in a scheme to steal $124 million from an English Premier League soccer club in May 2019.

    However, Hushpuppi’ lawyer, Gal Pissetzky, of Pissetzky & Berline, told Forbes that his client is an entrepreneur.

    He said the Instagram celebrity made his money legitimately through real estate, and from promoting brands.

    The legal representative said his client is “Absolutely not guilty of [the] charges they are accusing him of,” adding, “[Abbas] was running a legitimate business and a very legitimate Instagram account and did not take part in any scam or fraud.”

    Asked how Abbas paid for his lifestyle, Pissetzky told Forbes, “He’s an entrepreneur. He has real estate involvement … [he’s] an Instagram personality. He was promoting brands and that’s how he was very legitimately making his money”.

    Meanwhile, according to the Bureau of Prisons website, Hushpuppi is currently being held in MCC Chicago pending a bail hearing.

    If convicted, according to the police press statement following his arrest, the 37-year-old would face a statutory maximum sentence of 20 years in a federal prison.