DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Houstonian sent to prison for fraud schemes totaling nearly $2M

Posted on February 15, 2022 by Dissent

There is an update to a case involving the Teton School District that was first reported in 2018. Although the FBI was able to recover some of the stolen funds for the district, this was not the first time the district had suffered this type of breach. But at least now the threat actor responsible for the 2018 one will be going to prison:

HOUSTON – A 36-year-old Houston resident has been ordered to federal prison following his convictions of bank and wire fraud in two separate cases, announced U.S. Attorney Jennifer B. Lowery.

Julius Joachim Ohumole pleaded guilty Nov. 12, 2021.

Today, U.S. District Judge Hughes ordered he serve a total of 97 months in federal prison to be immediately followed by five years of supervised release.

At the time of his plea, Ohumole admitted he defrauded Regions Bank of over $1 million. Specifically, he opened a bank account in the name of Mars Construction using false identification documents identifying himself as Kenneth Davis.

Later, he accompanied another individual to Regions who used false identification documents to represent himself as a Regions accountholder. Ohumole asked for this person to be a co-signer on the Mars account, thereby allowing it to be linked to the real person’s account.

In January 2019, Ohumole caused $274,000 to be transferred from that account to the Mars account without permission or authorization. He then wired $273,000 to a bank account in New York and subsequently out of the United States.

In a separate case, Ohumole also defrauded the Teton School District in Idaho. In December 2018, he sent an email falsely representing to be from a construction contractor. In it, he claimed payments should be made to a new bank account.

Ohumole admitted in his plea that this new bank account had nothing to do with the real construction contractor and was actually his Comerica Bank account in Houston.

As a result of his scheme, the Teton School District sent $784,883.71 to Ohumole via his bank account.

He has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.

The FBI conducted the investigation. Assistant U.S. Attorney John Braddock is prosecuting the case.

Source:  USAO – Texas, Southern

h/t, @douglevin and @K12CyberMap

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • Previously Extradited Nigerian National Sentenced For Role In Multimillion-Dollar Business Email Compromise Schemes Targeting Educational Institutions And Businesses in North Carolina and Texas
  • Three North Korean Military Hackers Involved in Sony Pictures Hack, Wanna Cry, and Numerous Other Attacks Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe
  • Audits of New York schools and the State Education Department reveal ongoing significant concerns
Category: Education SectorFinancial Sector

Post navigation

← Williamsville CSD reveals 2021 cybersecurity breach
Ukrainian defense ministry hit by DDoS during tense standoff with Russia →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France
  • France issues press statement about arrest of ShinyHunters members
  • Patients Allege Home Delivery Pharmacy Failed to Timely Notify Them of Data Breach
  • Hackers breach Norwegian dam, open valve at full capacity

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions
  • NY Attorney General James Affirms Hospitals Must Provide Access to Emergency Abortion Care
  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.