DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Three Men Charged with Laundering Proceeds of a Business Email Compromise Scheme

Posted on October 8, 2021 by Dissent

Oct.7 – ALEXANDRIA, Va. – A federal grand jury returned a superseding indictment yesterday charging three individuals with money laundering and aggravated identity theft as part of a business email compromise (BEC) scheme.

According to allegations in the superseding indictment, Onyewuchi Ibeh, 21, of Bowie, Maryland, Jason Joyner, 42, of Washington, D.C., and Mouaaz Elkhebri, 30, of Alexandria, Virginia, participated in a scheme to launder the proceeds of a BEC scheme. In a BEC scheme, conspirators infiltrate the computer systems of a victim company, including their email servers and email accounts, through phishing attacks or the use of malware. Once there, the conspirators impersonate the victim’s business partner and claim the business partner’s bank account information has changed. Intending to send the money to the business partner, the victim business instead sends the money to bank accounts controlled by the conspirators.

The superseding indictment alleges the defendants laundered over $1.1 million fraudulently obtained from at least five victim businesses as a result of a BEC scheme. As alleged, the co-conspirators, laundered the proceeds of the BEC scheme through various financial transactions using dozens of bank accounts that they directly and indirectly controlled. Ibeh’s alleged role in the scheme was to manage the money laundering by causing conspirators to open bank accounts, which he used to wire money domestically and internationally. Joyner’s alleged role in the scheme was to withdraw the proceeds of the fraud in cash, which he delivered to other conspirators, including Ibeh. Elkhebri’s alleged role in the scheme was to open bank accounts in his name and use his position as a bank employee to facilitate the opening of bank accounts in the name of both co-conspirators and victims.

Ibeh and Joyner are charged with conspiracy to commit money laundering and money laundering. If convicted, Ibeh and Joyner each face a maximum penalty of 20 years in prison. Elkhebri is charged with conspiracy to commit money laundering, money laundering, false entries in a bank’s books, and aggravated identity theft. If convicted of all charges, Elkhebri faces a mandatory minimum penalty of two years in prison and a maximum penalty of 52 years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after taking into account the U.S. Sentencing Guidelines and other statutory factors.

Raj Parekh, Acting U.S. Attorney for the Eastern District of Virginia; Christopher A. Nielsen, Inspector in Charge of the Analytics and Cyber Group of the U.S. Postal Inspection Service; and Matthew S. Miller, Special Agent in Charge of the U.S. Secret Service’s Washington Field Office, made the announcement.

Assistant U.S. Attorney Christopher Hood is prosecuting the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No 1:21-cr-200.

An indictment is merely an accusation. The defendants are presumed innocent until proven guilty.

Source: U.S. Attorney’s Office, Eastern District of Virginia

Category: ID TheftPhishing

Post navigation

← JDC Healthcare discloses ransomware incident; still figuring out who needs to be notified
Je: Staff shortages blamed for lost medical records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.