June 11, 2018

International Business E-Mail Compromise Takedown

Multiple Countries Involved in Coordinated Law Enforcement Effort



Today, federal authorities—including the Department of Justice and the FBI—announced a major coordinated law enforcement effort to disrupt international business e-mail compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals. 

Operation WireWire—which also included the Department of Homeland Security, the Department of the Treasury, and the U.S. Postal Inspection Service—involved a six-month sweep that culminated in over two weeks of intensified law enforcement activity resulting in 74 arrests in the U.S. and overseas, including 42 in the U.S., 29 in Nigeria, and three in Canada, Mauritius, and Poland. The operation also resulted in the seizure of nearly $2.4 million and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

A number of cases charged in this operation involved international criminal organizations that defrauded small- to large-sized businesses, while others involved individual victims who transferred high-dollar amounts or sensitive records in the course of business. The devastating impacts these cases have on victims and victim companies affect not only the individual business but also the global economy. Since the Internet Crime Complaint Center (IC3) began formally keeping track of BEC and its variant, e-mail account compromise (EAC), there has been a loss of over $3.7 billion reported to the IC3.


Adeyemi Odufuye and his team, for example, sifted SEC records, company websites and other business documents, looking for the names and email addresses of chief executives, chief financial officers and controllers, court documents say.

Odufuye, who had a half dozen nicknames, including “Jefe,” the Spanish word for “chief” or “boss,” led a crew responsible for stealing $2.6 million, including $440,000 from one business in Connecticut, according to the Justice Department.

The schemes used a variety of tactics to gain people’s trust and steal their money, federal authorities say. They registered website domain names that were hard to distinguish from the companies they were targeting — impersonations meant to give emails an air of authenticity. Some of those emails arrived with malware attachments that would snap images of a victim’s desktop or transmit key log information — a hacker trick for nabbing someone’s password.

They even employed money mules whose sole purpose was to move the ill-gotten gains from account to account, authorities say, disguising the electronic paper trail from investigators.



https://www.fbi.gov/news/stories/international-bec-takedown-061118


If you think you are too small to make a difference, you haven't spend the night with a mosquito.
- African Proverb