DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Three Men Charged with Laundering Proceeds of a Business Email Compromise Scheme

Posted on October 8, 2021 by Dissent

Oct.7 – ALEXANDRIA, Va. – A federal grand jury returned a superseding indictment yesterday charging three individuals with money laundering and aggravated identity theft as part of a business email compromise (BEC) scheme.

According to allegations in the superseding indictment, Onyewuchi Ibeh, 21, of Bowie, Maryland, Jason Joyner, 42, of Washington, D.C., and Mouaaz Elkhebri, 30, of Alexandria, Virginia, participated in a scheme to launder the proceeds of a BEC scheme. In a BEC scheme, conspirators infiltrate the computer systems of a victim company, including their email servers and email accounts, through phishing attacks or the use of malware. Once there, the conspirators impersonate the victim’s business partner and claim the business partner’s bank account information has changed. Intending to send the money to the business partner, the victim business instead sends the money to bank accounts controlled by the conspirators.

The superseding indictment alleges the defendants laundered over $1.1 million fraudulently obtained from at least five victim businesses as a result of a BEC scheme. As alleged, the co-conspirators, laundered the proceeds of the BEC scheme through various financial transactions using dozens of bank accounts that they directly and indirectly controlled. Ibeh’s alleged role in the scheme was to manage the money laundering by causing conspirators to open bank accounts, which he used to wire money domestically and internationally. Joyner’s alleged role in the scheme was to withdraw the proceeds of the fraud in cash, which he delivered to other conspirators, including Ibeh. Elkhebri’s alleged role in the scheme was to open bank accounts in his name and use his position as a bank employee to facilitate the opening of bank accounts in the name of both co-conspirators and victims.

Ibeh and Joyner are charged with conspiracy to commit money laundering and money laundering. If convicted, Ibeh and Joyner each face a maximum penalty of 20 years in prison. Elkhebri is charged with conspiracy to commit money laundering, money laundering, false entries in a bank’s books, and aggravated identity theft. If convicted of all charges, Elkhebri faces a mandatory minimum penalty of two years in prison and a maximum penalty of 52 years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after taking into account the U.S. Sentencing Guidelines and other statutory factors.

Raj Parekh, Acting U.S. Attorney for the Eastern District of Virginia; Christopher A. Nielsen, Inspector in Charge of the Analytics and Cyber Group of the U.S. Postal Inspection Service; and Matthew S. Miller, Special Agent in Charge of the U.S. Secret Service’s Washington Field Office, made the announcement.

Assistant U.S. Attorney Christopher Hood is prosecuting the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No 1:21-cr-200.

An indictment is merely an accusation. The defendants are presumed innocent until proven guilty.

Source: U.S. Attorney’s Office, Eastern District of Virginia

Category: ID TheftPhishing

Post navigation

← JDC Healthcare discloses ransomware incident; still figuring out who needs to be notified
Je: Staff shortages blamed for lost medical records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.