Thursday, May 1, 2025
HomeCyber Security NewsNigerian National Pleads Guilty for Hacking Business & Individual Emails

Nigerian National Pleads Guilty for Hacking Business & Individual Emails

Published on

SIEM as a Service

Follow Us on Google News

 Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities.

This case highlights the global nature of cybercrime and the importance of international cooperation in bringing perpetrators to justice.

Henry Onyedikachi Echefu, originally from Nigeria and residing in South Africa during his criminal activities, has recently faced the consequences of his actions in a United States courtroom.

- Advertisement - Google News

Echefu’s journey to accountability began upon his arrival in the United States on November 30, 2023, following his deportation from Canada.

His guilty plea is pivotal in the ongoing battle against cyber fraud.

BEC Scheme

From February to July 2017, Echefu, alongside his accomplices, engaged in a BEC scheme targeting individuals and businesses.

Document
Integrate ANY.RUN in your company for Effective Malware Analysis

Are you from SOC and DFIR teams? – Join With 400,000 independent Researchers

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..


By gaining unauthorized access to email accounts, the conspirators sent fraudulent wiring instructions from “spoofed” emails, tricking victims into transferring money to bank accounts under their control.

These “drop accounts” were the first step in a complex web of financial deception.

The illicit funds in the drop accounts were just the beginning. Echefu and his co-conspirators laundered the stolen money through a series of transactions to obscure its origin.

They attempted to cleanse the proceeds of their crimes by transferring funds between accounts, withdrawing cash, and using cashier’s checks.

Echefu personally managed over $22,000 of the fraudulently obtained money, showcasing his direct benefit from these illegal activities.

The US Attorney’s office has revealed that a Nigerian national has pleaded guilty to his involvement in a business email compromise scheme.

Guilty Plea and Sentencing

Acknowledging his involvement, Echefu has agreed to a plea deal with a restitution payment of at least $199,929 to the victims and a separate money judgment of $22,187.35.

He now faces up to 20 years in federal prison for each charge against him, with sentencing scheduled for May 23, 2024.

This case is a stark reminder of the severe consequences awaiting those who engage in cyber fraud and money laundering.

Investigation and Assistance

The successful apprehension and prosecution of Echefu were made possible through the collaborative efforts of various agencies, including Homeland Security Investigations (HSI) Baltimore, the U.S. Secret Service – Washington Field Office, and the Justice Department’s Office of International Affairs.

Special recognition was given to the Mid-Atlantic El Dorado Task Force and the Department of Justice Canada’s International Assistance Group for their roles in the investigation and extradition processes.

This case underscores the critical importance of international cooperation in combating cybercrime.

United States Attorney Erek L. Barron praised the dedication and hard work of all involved, emphasizing the U.S. justice system’s commitment to holding cybercriminals accountable, regardless of their location.

As the digital landscape continues to evolve, Henry Onyedikachi Echefu’s case serves as a cautionary tale for those considering engaging in cybercrime.

It also highlights the resilience and determination of law enforcement agencies worldwide to pursue justice and protect innocent victims from these increasingly sophisticated schemes.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender...

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own...

Quantum Computing and Cybersecurity – What CISOs Need to Know Now

As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers...

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code

A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender...

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own...

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code

A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered,...