DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Previously Extradited Nigerian National Sentenced For Role In Multimillion-Dollar Business Email Compromise Schemes Targeting Educational Institutions And Businesses in North Carolina and Texas

Posted on October 2, 2024 by Dissent

CHARLOTTE, N.C. –  A dual citizen of Nigeria and the United Kingdom was sentenced today to seven years in prison for his role in a multimillion-dollar business email compromise (BEC) scheme, announced Dena J. King, U.S. Attorney for the Western District of North Carolina, and Alamdar S. Hamdani, U.S. Attorney for the Southern District of Texas.

According to court documents, Oludayo Kolawole John Adeagbo, 45, conspired with others to participate in multiple cyber-enabled BEC schemes that defrauded a North Carolina university of more than $1.9 million, and attempted to steal more than $3 million from victim entities in Texas, including local government entities, construction companies, and a Houston-area college.

Adeagbo, also known as John Edwards and John Dayo, arrived in the United States in August 2022 after he was extradited from the United Kingdom to face criminal charges filed in Charlotte and in Houston. On April 8, 2024, Adeagbo pleaded guilty to one count each of wire fraud and conspiracy to commit wire fraud for his criminal conduct in both cases, following the transfer of the case in the U.S. District Court for the Southern District of Texas to the U.S. District Court for the Western District of North Carolina.

“BEC schemes, like the one perpetrated by Adeagbo and his co-conspirators, are sophisticated and devastating crimes that target the trust businesses and institutions place in their daily operations,” said U.S. Attorney King. “By exploiting this trust, fraudsters steal millions of dollars from unsuspecting victims. This case demonstrates the commitment of my office and our law enforcement partners to pursue justice for those impacted by these schemes and to hold cybercriminals accountable, regardless of where they are operating from.”

“Adeagbo ran a sophisticated 21st century cyber-criminal operation hiding behind fake email accounts and anonymous internet addresses to steal from the innocent, a crime as old as time itself,” said U.S. Attorney Hamdani. “BEC scams have become an epidemic with individuals and businesses suffering debilitating financial losses, while eroding society’s trust in digital communications and undermining overall economic stability. That’s why prosecutors and agents in two jurisdictions worked tirelessly to identify Adeagbo and reach across the Atlantic to bring him to justice.”

“Oludayo Adeagbo thought he was pretty slick stealing other people’s money via this scam. His victims, however, strongly disagreed,” said Executive Assistant Director Michael Nordwall of the FBI. “Instead of enjoying the fruits of his illegal labors, Adeagbo will now be spending time in a federal prison. The BEC is one of the fastest growing and most costly scams and the only way to fight it is through cooperation, often international cooperation, and this case is a prime example of partnerships working.”

“As a North Carolina University planned for growth with a new construction project, Adeagbo worked on a scheme to defraud the school by stealing nearly two million dollars of its funding,” said Special Agent in Charge Robert M. DeWitt of the FBI Charlotte Field Office. “When he and his conspirators first committed this business email compromise more than seven years ago, they likely never expected to get caught. This federal prison sentence shows the FBI will do everything possible to find and hold international financial fraudsters accountable.”

“Mr. Adeagbo’s multimillion-dollar BEC scheme inflicted substantial financial damage on trusted educational institutions, government municipalities, and innocent businesses within our community,” said Special Agent in Charge Douglas Williams of the FBI Houston Field Office. “In a world increasingly reliant on the digital landscape, this sentencing serves as a powerful reminder that cybercrime has real consequences. FBI Houston will continue to investigate, attribute, and impose severe consequences on cyber criminals seeking to harm others through deceit and fraud.”

A BEC scheme, also referred to as “cyber-enabled financial fraud,” is a sophisticated scam that often targets individuals, employees, or businesses involved in financial transactions or that regularly perform wire transfer payments. Fraudsters are usually part of larger criminal networks operating in the United States and abroad.

There are many variations of BEC scams. Generally, the schemes involve perpetrators gaining unauthorized access to legitimate email accounts or creating email accounts that closely resemble those of individuals or employees associated with the targeted businesses or involved in business transactions with the victim businesses. The scammers then use the compromised or fake email accounts to send false wiring instructions to the targeted businesses or individuals, to dupe the victims into sending money to bank accounts controlled by perpetrators of the scheme. Generally, the money is quickly transferred to other accounts in the United States or overseas.

The North Carolina BEC Scheme

According to court documents and court proceedings, from August 30, 2016, to January 12, 2017, Adeagbo, his codefendant, Donald Ikenna Echeazu, 42, a dual citizen of Nigeria and the United Kingdom extradited to the United States, and others defrauded a North Carolina university (the University) of more than $1.9 million via a BEC scheme.

Court records show that Adeagbo and his co-conspirators obtained information about significant construction projects occurring throughout the United States, including an ongoing multi-million-dollar project at the University. To execute the scheme, Adeagbo, Echeazu, and others registered a domain name similar to that of the legitimate construction company in charge of the University’s project and created an email address that closely resembled that of an employee of the construction company. Using the fake email address, the fraudsters deceived and directed the University to wire a payment of more than $1.9 million to a bank account controlled by an individual working under the direction of Adeagbo and his co-conspirators. Upon receiving the payment, Adeagbo and his co-conspirators laundered the stolen proceeds through a series of financial transactions designed to conceal the fraud.

The Texas BEC Scheme

According to information contained in court documents, from November 2016 until July 2018, Adeagbo conspired with others to participate in multiple cyber-enabled business email compromises in an attempt to steal more than $3 million from victim entities in Texas, including local government entities, construction companies and a Houston-area college. As with the scheme in North Carolina, Adeagbo and his co-conspirators registered domain names that looked similar to legitimate companies. They then sent emails from those domains pretending to be employees at those companies to clients or customers of the companies they impersonated and deceived those customers into sending wire payments to bank accounts the co-conspirators controlled.

Adeagbo remains in federal custody. He will be transferred to the custody of the Federal Bureau of Prisons upon designation of a federal facility.

On May 16, 2023, Echeazu was sentenced to 18 months in prison followed by a year of supervised release and was ordered to pay $655,408.87 in restitution for his role in the conspiracy.

As part of his sentence, Adeagbo was sentenced to one year of supervised release following his sentence of incarceration and ordered to pay $942,655.03 in restitution for his role in the scheme.

The FBI’s Houston Cyber Task Force and Charlotte Field Office conducted the investigation with assistance from the FBI’s Cyber and Criminal Investigative Divisions. The United Kingdom’s National Crime Agency, Metropolitan Police Service, City of London Police and Crown Prosecution Service also provided substantial assistance. The Justice Department’s Office of International Affairs helped secure the arrest and extradition.

Assistant U.S. Attorney Graham Billings for the Western District of North Carolina, Assistant U.S. Attorney Rodolfo Ramirez for the Southern District of Texas, and Trial Attorney Brian Mund of the Criminal Division’s Computer Crime and Intellectual Property Section prosecuted the case.

If you suspect you are a victim of a BEC scheme, you can file a complaint online with the FBI’s Internet Complaint Crime Complaint Center (IC3) at bec.ic3.gov. The IC3 staff reviews complaints to detect patterns or other indicators of significant criminal activity for potential criminal prosecution. The FBI provides a variety of resources relating to BEC scams through the IC3, which can be located at www.ic3.gov. For more information on BEC scams, visit: www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise

Updated October 1, 2024

Source: U.S. Attorney’s Office, Western District of North Carolina


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Kaufman County's data breach was their second one in three weeks
Category: Business SectorEducation SectorGovernment SectorPhishingU.S.

Post navigation

← Crooked Cops, Stolen Laptops & the Ghost of UGNazi – Krebs
NZ: New Zealand hearing clinic Bloom warns of massive data theft in ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.