DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme

Posted on June 7, 2025 by Dissent

Jay Clayton, the United States Attorney for the Southern District of New York, and Christopher G. Raia, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced that KINGSLEY UCHELUE UTULU was sentenced today by U.S. District Judge Paul G. Gardephe to 63 months in prison for his role in a broad hacking, fraud, and identity theft scheme targeting U.S.-based businesses and individuals.  UTULU previously pled guilty to conspiracy to commit wire fraud.

“Kingsley Uchelue Utulu took part in a scheme to hack into U.S. tax preparation businesses, trade in the stolen personal identifying information, and defraud the IRS and other governmental bodies,” said U.S. Attorney Jay Clayton.  “Offshore scammers like Utulu and his co-conspirators may think they can target hard-working Americans with their hacking and fraud schemes and avoid prosecution.  The message from the Department and the FBI is clear, they cannot.  We are committed to protecting Americans from criminals operating offshore.”

FBI Assistant Director in Charge Christopher G. Raia said: “Kingsley Utulu, a Nigerian national, was part of a scheme that targeted and infiltrated electronic systems of U.S.-based companies to steal more than two million dollars through fraudulent tax returns.  Along with his co-conspirators, this defendant’s scheme reached across the globe to exploit sensitive information for financial gain.  The FBI will never exempt any individual who seeks to unlawfully profit through deceitful practices, regardless of where they are located.”

According to the Indictment, public court filings, and statements made in court:

Beginning in at least in or about 2019, UTULU and other Nigeria-based conspirators took part in a scheme to hack into U.S-based tax preparation businesses.  The conspirators utilized spearphishing emails to obtain access to these business’s electronic systems.  Once they had obtained access, the conspirators stole the tax and other identifying information of the business’ customers.  The conspirators hacked into several U.S.-based tax businesses, located in New York, Texas, and other states.

The conspirators obtained the stolen identity information of thousands of individuals.  They used this information to file fraudulent tax returns with the Internal Revenue Service and state tax authorities.  The conspirators sought fraudulent refunds of at least approximately $8.4 million, of which they successfully obtained at least approximately $2.5 million.

In addition to filing fraudulent tax returns, the conspirators used the stolen identities to file fraudulent claims with the Small Business Administration’s Economic Injury Disaster Loan program.  The conspirators were able to obtain at least an additional approximately $819,000 in fraudulent payouts.

UTULU was arrested for his involvement in this scheme while being present in the United Kingdom and was thereafter extradited to the U.S. to be prosecuted.

In addition to the prison term, UTULU, 38, of Nigeria, was ordered to pay restitution in an amount of $3,683,029.39 and forfeiture in the amount of $290,250.

Mr. Clayton praised the outstanding investigative work of the FBI.

The prosecution of this case is being handled by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorney Daniel G. Nessim is in charge of the prosecution.

Updated June 6, 2025

Source: U.S. Attorney’s Office, Southern District of New York

Category: Business SectorHackID Theft

Post navigation

← Data breach of patient info ends in firing of Miami hospital employee
Hearing on the Federal Government and AI →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts
  • MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack
  • Four REvil ransomware members released after time served on carding charges
  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.