DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Man Charged In Scheme To Steal More Than $1.5 Million From A U.S. Financial Institution

Posted on October 31, 2016 by Dissent

On October 27, a complaint was unsealed charging Dwayne C. Hans, a United States citizen, with wire fraud, computer fraud, and money laundering.  According to the complaint, between April 2016 and July 2016, the defendant masterminded a series of frauds against a U.S. financial institution in which he masqueraded as an authorized representative of that institution.  Using that ruse, he transferred funds from the financial institution’s corporate bank accounts for his own use.  The defendant also accessed a website run by the U.S. General Services Administration without authorization and then redirected money intended for the financial institution to his own bank account.

The defendant’s initial appearance was held yesterday before United States District Judge Thomas O. Rice at the U.S. Courthouse in Spokane, Washington.  The court scheduled a detention hearing for Monday, October 31, to determine whether the defendant will be held in custody pending his removal to the Eastern District of New York for further proceedings.

The charges were announced by Robert L. Capers, United States Attorney for the Eastern District of New York, and William F. Sweeney, Jr., Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI).

As alleged in the complaint, the defendant stole $134,000 from the financial institution and attempted to steal approximately $1.5 million more.  Posing as someone authorized to conduct financial transactions for the financial institution, the defendant misappropriated money from corporate bank accounts to buy shares of stock in publicly traded companies, invest in a real estate property in Brooklyn, New York, and benefit his family members.  He also conducted an unauthorized intrusion into the website SAM.gov, which stores information about companies that provide services to the federal government.  During this unauthorized website intrusion, the defendant changed information in entries pertaining to the financial institution, including by replacing the bank account information for the financial institution with the defendant’s personal bank account information.  As a result, the Pension Benefit Guarantee Corporation sent more than $1.5 million to the defendant instead of the financial institution.  These fraudulent wire transfers were reversed once they were detected.

The defendant was arrested in Richland, Washington, on October 26, 2016, pursuant to a criminal complaint issued in the Eastern District of New York.

 

The charges in the complaint are allegations, and the defendant is presumed innocent unless and until proven guilty.

The government’s case is being handled by the Office’s National Security & Cybercrime Section.  Assistant United States Attorney David K. Kessler is in charge of the prosecution.

The Defendant:

DWAYNE C. HANS
Age: 27

E.D.N.Y. Docket No. 16-MJ-951

SOURCE: U.S. Attorney’s Office, Eastern District of New York


Related:

  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • France Travail: At least 340,000 job seekers victims of new hack
  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
Category: Financial SectorGovernment SectorHackU.S.

Post navigation

← UK: Former Solent NHS Trust employee prosecuted for Section 55 offense
Two Indicted for Conspiracy, Wire Fraud, and Aggravated Identity Theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.