Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cyber Crime»Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    Kosi Goodness Simon-Ebo, a 29-year-old Nigerian citizen who was extradited from Canada to the United States last April, has pleaded guilty to charges of wire fraud and money laundering in connection with a sophisticated business email compromise (BEC) scheme.

    Simon-Ebo has confessed to his involvement in a criminal conspiracy dating back to 2017 when he resided in South Africa. During this time, he conspired with individuals based in the United States to compromise business and employee email accounts.

    The scheme involved using these compromised email accounts to contact various businesses, all the while disguising their true identities by employing spoofed sender addresses, making the emails appear as if they originated from reputable sources.

    Within these deceptive emails, the fraudsters included payment requests and wiring instructions, which ultimately led the unsuspecting victims to transfer funds into bank accounts controlled by Simon-Ebo and his co-conspirators.

    To further obfuscate the illicit funds’ trail, the criminals proceeded to move the money between accounts before ultimately withdrawing cash. Additionally, they employed cashier’s checks to write payments to different individuals and business entities, further obscuring the money’s origins.

    The plea agreement highlights that the scammers achieved a notably high success rate, with approximately $1 million stolen out of the nearly $7 million they attempted to pilfer.

    “The intended loss for transactions in which Simon-Ebo was directly involved—which were some, but not all of the transactions involving Simon-Ebo and his co-conspirators—was approximately $6,988,249, and the actual loss resulting from these transactions was at least $1,072,306,” stated the U.S. Department of Justice (DoJ).

    Simon-Ebo now faces the possibility of a maximum prison sentence of 20 years. The official sentencing is scheduled for November 29, 2023, to be held at the U.S. District Court of Maryland.

    In addition to the potential prison term, the convicted BEC operator will be required to pay restitution totaling $1,072,306, equivalent to the total losses incurred by the victims of the scheme.

    The Expanding Threat of BEC Scams

    Business email compromise continues to pose a significant threat to companies and organizations globally. In 2021 alone, losses stemming from BEC schemes amounted to nearly $2.4 billion in the United States, as reported by the FBI, which received approximately 20,000 complaints related to such scams during that year.

    Verizon’s June 2023 report revealed a concerning trend, with BEC attacks nearly doubling in frequency this year. These attacks often originate from legitimate yet compromised email addresses, making them particularly difficult to detect.

    In March 2023, the FBI issued a warning regarding the evolving tactics of BEC fraudsters. Instead of targeting funds directly, they have shifted their focus to redirecting valuable assets, including hardware, construction materials, and solar energy products.

    Furthermore, a report from Microsoft in the same month highlighted the alarming speed at which BEC attacks unfold. The entire process, from compromising email credentials to registering typo-squatting domains and hijacking existing email threads, can be executed within just a few hours.

    Post Views: 57
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks
    Next Article Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Crime November 29, 2023

    How Hackers Phish for Your Users’ Credentials and Sell Them

    November 29, 2023
    Cyber Attacks October 8, 2023

    North Korea’s Lazarus Group Utilizes Cross-Chain Cryptocurrency Laundering Techniques to Illicitly Gain $900 Million

    October 8, 2023
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.