Friday, February 21, 2025
HomeCyber Security NewsNigerian National Pleads Guilty for Hacking Business & Individual Emails

Nigerian National Pleads Guilty for Hacking Business & Individual Emails

Published on

SIEM as a Service

Follow Us on Google News

 Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities.

This case highlights the global nature of cybercrime and the importance of international cooperation in bringing perpetrators to justice.

Henry Onyedikachi Echefu, originally from Nigeria and residing in South Africa during his criminal activities, has recently faced the consequences of his actions in a United States courtroom.

Echefu’s journey to accountability began upon his arrival in the United States on November 30, 2023, following his deportation from Canada.

His guilty plea is pivotal in the ongoing battle against cyber fraud.

BEC Scheme

From February to July 2017, Echefu, alongside his accomplices, engaged in a BEC scheme targeting individuals and businesses.

Document
Integrate ANY.RUN in your company for Effective Malware Analysis

Are you from SOC and DFIR teams? – Join With 400,000 independent Researchers

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..


By gaining unauthorized access to email accounts, the conspirators sent fraudulent wiring instructions from “spoofed” emails, tricking victims into transferring money to bank accounts under their control.

These “drop accounts” were the first step in a complex web of financial deception.

The illicit funds in the drop accounts were just the beginning. Echefu and his co-conspirators laundered the stolen money through a series of transactions to obscure its origin.

They attempted to cleanse the proceeds of their crimes by transferring funds between accounts, withdrawing cash, and using cashier’s checks.

Echefu personally managed over $22,000 of the fraudulently obtained money, showcasing his direct benefit from these illegal activities.

The US Attorney’s office has revealed that a Nigerian national has pleaded guilty to his involvement in a business email compromise scheme.

Guilty Plea and Sentencing

Acknowledging his involvement, Echefu has agreed to a plea deal with a restitution payment of at least $199,929 to the victims and a separate money judgment of $22,187.35.

He now faces up to 20 years in federal prison for each charge against him, with sentencing scheduled for May 23, 2024.

This case is a stark reminder of the severe consequences awaiting those who engage in cyber fraud and money laundering.

Investigation and Assistance

The successful apprehension and prosecution of Echefu were made possible through the collaborative efforts of various agencies, including Homeland Security Investigations (HSI) Baltimore, the U.S. Secret Service – Washington Field Office, and the Justice Department’s Office of International Affairs.

Special recognition was given to the Mid-Atlantic El Dorado Task Force and the Department of Justice Canada’s International Assistance Group for their roles in the investigation and extradition processes.

This case underscores the critical importance of international cooperation in combating cybercrime.

United States Attorney Erek L. Barron praised the dedication and hard work of all involved, emphasizing the U.S. justice system’s commitment to holding cybercriminals accountable, regardless of their location.

As the digital landscape continues to evolve, Henry Onyedikachi Echefu’s case serves as a cautionary tale for those considering engaging in cybercrime.

It also highlights the resilience and determination of law enforcement agencies worldwide to pursue justice and protect innocent victims from these increasingly sophisticated schemes.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...