Monday, April 7, 2025
HomeCyber Security NewsNigerian National Extradited to Nebraska for Wire Fraud Charges

Nigerian National Extradited to Nebraska for Wire Fraud Charges

Published on

SIEM as a Service

Follow Us on Google News

United States Attorney Susan Lehr announced the extradition of Abiola Kayode, 37, from Nigeria to the District of Nebraska.

The extradition follows a Conspiracy to Commit Wire Fraud indictment filed against Kayode in August 2019.

This case highlights international cooperation in combating online fraud. Kayode, who was arrested by law enforcement authorities in the Republic of Ghana in April 2023 at the request of the U.S., was surrendered to FBI special agents.

- Advertisement - Google News

He made his initial appearance before United States Magistrate Judge Michael D. Nelson on December 11, 2024, where he was ordered to remain detained pending trial.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Allegations against Kayode center on his involvement in a sophisticated Business Email Compromise (BEC) scheme that operated from January 2015 to September 2016.

His co-conspirators allegedly posed as senior executives from targeted companies, using spoofed email accounts to direct unwitting employees to make wire transfers. The fraudulent activities reportedly defrauded businesses in Nebraska and elsewhere of over $6 million.

The indictment alleges that Kayode played a crucial role by providing bank account information to his co-conspirators. These accounts, often belonging to victims of internet romance scams, were used to funnel the illicit proceeds.

Several of Kayode’s co-conspirators have already faced justice. Adewale Aniyeloye, who was involved in sending fraudulent emails, was sentenced to 96 months imprisonment and ordered to pay restitution of $1,570,938.05.

Pelumi Fawehinimi, a bank account facilitator, received a 72-month sentence with restitution totaling $1,014,159.60. Onome Ijomone, extradited from Poland, was sentenced to 60 months in prison and restitution of $508,934.40. Recently, Alex Ogunshakin was sentenced to 45 months’ imprisonment following his extradition from Nigeria.

The FBI, along with international partners, remains committed to dismantling cybercriminal networks. “Our message to the remaining co-conspirators is clear: we are coming for you,” said FBI Omaha Special Agent in Charge Eugene Kowel.

This case underscores the ongoing efforts of the FBI, DOJ, and international law enforcement to bring cybercriminals to justice.

This case was investigated by the FBI, with significant assistance from the Department of Justice’s Office of International Affairs in securing Kayode’s extradition. All defendants are presumed innocent until proven guilty in a court of law.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...