DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Previously Extradited Nigerian National Sentenced For Role In Multimillion-Dollar Business Email Compromise Schemes Targeting Educational Institutions And Businesses in North Carolina and Texas

Posted on October 2, 2024 by Dissent

CHARLOTTE, N.C. –  A dual citizen of Nigeria and the United Kingdom was sentenced today to seven years in prison for his role in a multimillion-dollar business email compromise (BEC) scheme, announced Dena J. King, U.S. Attorney for the Western District of North Carolina, and Alamdar S. Hamdani, U.S. Attorney for the Southern District of Texas.

According to court documents, Oludayo Kolawole John Adeagbo, 45, conspired with others to participate in multiple cyber-enabled BEC schemes that defrauded a North Carolina university of more than $1.9 million, and attempted to steal more than $3 million from victim entities in Texas, including local government entities, construction companies, and a Houston-area college.

Adeagbo, also known as John Edwards and John Dayo, arrived in the United States in August 2022 after he was extradited from the United Kingdom to face criminal charges filed in Charlotte and in Houston. On April 8, 2024, Adeagbo pleaded guilty to one count each of wire fraud and conspiracy to commit wire fraud for his criminal conduct in both cases, following the transfer of the case in the U.S. District Court for the Southern District of Texas to the U.S. District Court for the Western District of North Carolina.

“BEC schemes, like the one perpetrated by Adeagbo and his co-conspirators, are sophisticated and devastating crimes that target the trust businesses and institutions place in their daily operations,” said U.S. Attorney King. “By exploiting this trust, fraudsters steal millions of dollars from unsuspecting victims. This case demonstrates the commitment of my office and our law enforcement partners to pursue justice for those impacted by these schemes and to hold cybercriminals accountable, regardless of where they are operating from.”

“Adeagbo ran a sophisticated 21st century cyber-criminal operation hiding behind fake email accounts and anonymous internet addresses to steal from the innocent, a crime as old as time itself,” said U.S. Attorney Hamdani. “BEC scams have become an epidemic with individuals and businesses suffering debilitating financial losses, while eroding society’s trust in digital communications and undermining overall economic stability. That’s why prosecutors and agents in two jurisdictions worked tirelessly to identify Adeagbo and reach across the Atlantic to bring him to justice.”

“Oludayo Adeagbo thought he was pretty slick stealing other people’s money via this scam. His victims, however, strongly disagreed,” said Executive Assistant Director Michael Nordwall of the FBI. “Instead of enjoying the fruits of his illegal labors, Adeagbo will now be spending time in a federal prison. The BEC is one of the fastest growing and most costly scams and the only way to fight it is through cooperation, often international cooperation, and this case is a prime example of partnerships working.”

“As a North Carolina University planned for growth with a new construction project, Adeagbo worked on a scheme to defraud the school by stealing nearly two million dollars of its funding,” said Special Agent in Charge Robert M. DeWitt of the FBI Charlotte Field Office. “When he and his conspirators first committed this business email compromise more than seven years ago, they likely never expected to get caught. This federal prison sentence shows the FBI will do everything possible to find and hold international financial fraudsters accountable.”

“Mr. Adeagbo’s multimillion-dollar BEC scheme inflicted substantial financial damage on trusted educational institutions, government municipalities, and innocent businesses within our community,” said Special Agent in Charge Douglas Williams of the FBI Houston Field Office. “In a world increasingly reliant on the digital landscape, this sentencing serves as a powerful reminder that cybercrime has real consequences. FBI Houston will continue to investigate, attribute, and impose severe consequences on cyber criminals seeking to harm others through deceit and fraud.”

A BEC scheme, also referred to as “cyber-enabled financial fraud,” is a sophisticated scam that often targets individuals, employees, or businesses involved in financial transactions or that regularly perform wire transfer payments. Fraudsters are usually part of larger criminal networks operating in the United States and abroad.

There are many variations of BEC scams. Generally, the schemes involve perpetrators gaining unauthorized access to legitimate email accounts or creating email accounts that closely resemble those of individuals or employees associated with the targeted businesses or involved in business transactions with the victim businesses. The scammers then use the compromised or fake email accounts to send false wiring instructions to the targeted businesses or individuals, to dupe the victims into sending money to bank accounts controlled by perpetrators of the scheme. Generally, the money is quickly transferred to other accounts in the United States or overseas.

The North Carolina BEC Scheme

According to court documents and court proceedings, from August 30, 2016, to January 12, 2017, Adeagbo, his codefendant, Donald Ikenna Echeazu, 42, a dual citizen of Nigeria and the United Kingdom extradited to the United States, and others defrauded a North Carolina university (the University) of more than $1.9 million via a BEC scheme.

Court records show that Adeagbo and his co-conspirators obtained information about significant construction projects occurring throughout the United States, including an ongoing multi-million-dollar project at the University. To execute the scheme, Adeagbo, Echeazu, and others registered a domain name similar to that of the legitimate construction company in charge of the University’s project and created an email address that closely resembled that of an employee of the construction company. Using the fake email address, the fraudsters deceived and directed the University to wire a payment of more than $1.9 million to a bank account controlled by an individual working under the direction of Adeagbo and his co-conspirators. Upon receiving the payment, Adeagbo and his co-conspirators laundered the stolen proceeds through a series of financial transactions designed to conceal the fraud.

The Texas BEC Scheme

According to information contained in court documents, from November 2016 until July 2018, Adeagbo conspired with others to participate in multiple cyber-enabled business email compromises in an attempt to steal more than $3 million from victim entities in Texas, including local government entities, construction companies and a Houston-area college. As with the scheme in North Carolina, Adeagbo and his co-conspirators registered domain names that looked similar to legitimate companies. They then sent emails from those domains pretending to be employees at those companies to clients or customers of the companies they impersonated and deceived those customers into sending wire payments to bank accounts the co-conspirators controlled.

Adeagbo remains in federal custody. He will be transferred to the custody of the Federal Bureau of Prisons upon designation of a federal facility.

On May 16, 2023, Echeazu was sentenced to 18 months in prison followed by a year of supervised release and was ordered to pay $655,408.87 in restitution for his role in the conspiracy.

As part of his sentence, Adeagbo was sentenced to one year of supervised release following his sentence of incarceration and ordered to pay $942,655.03 in restitution for his role in the scheme.

The FBI’s Houston Cyber Task Force and Charlotte Field Office conducted the investigation with assistance from the FBI’s Cyber and Criminal Investigative Divisions. The United Kingdom’s National Crime Agency, Metropolitan Police Service, City of London Police and Crown Prosecution Service also provided substantial assistance. The Justice Department’s Office of International Affairs helped secure the arrest and extradition.

Assistant U.S. Attorney Graham Billings for the Western District of North Carolina, Assistant U.S. Attorney Rodolfo Ramirez for the Southern District of Texas, and Trial Attorney Brian Mund of the Criminal Division’s Computer Crime and Intellectual Property Section prosecuted the case.

If you suspect you are a victim of a BEC scheme, you can file a complaint online with the FBI’s Internet Complaint Crime Complaint Center (IC3) at bec.ic3.gov. The IC3 staff reviews complaints to detect patterns or other indicators of significant criminal activity for potential criminal prosecution. The FBI provides a variety of resources relating to BEC scams through the IC3, which can be located at www.ic3.gov. For more information on BEC scams, visit: www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise

Updated October 1, 2024

Source: U.S. Attorney’s Office, Western District of North Carolina

Category: Business SectorEducation SectorGovernment SectorPhishingU.S.

Post navigation

← Crooked Cops, Stolen Laptops & the Ghost of UGNazi – Krebs
NZ: New Zealand hearing clinic Bloom warns of massive data theft in ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.