DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Three Men Charged with Laundering Proceeds of a Business Email Compromise Scheme

Posted on October 8, 2021 by Dissent

Oct.7 – ALEXANDRIA, Va. – A federal grand jury returned a superseding indictment yesterday charging three individuals with money laundering and aggravated identity theft as part of a business email compromise (BEC) scheme.

According to allegations in the superseding indictment, Onyewuchi Ibeh, 21, of Bowie, Maryland, Jason Joyner, 42, of Washington, D.C., and Mouaaz Elkhebri, 30, of Alexandria, Virginia, participated in a scheme to launder the proceeds of a BEC scheme. In a BEC scheme, conspirators infiltrate the computer systems of a victim company, including their email servers and email accounts, through phishing attacks or the use of malware. Once there, the conspirators impersonate the victim’s business partner and claim the business partner’s bank account information has changed. Intending to send the money to the business partner, the victim business instead sends the money to bank accounts controlled by the conspirators.

The superseding indictment alleges the defendants laundered over $1.1 million fraudulently obtained from at least five victim businesses as a result of a BEC scheme. As alleged, the co-conspirators, laundered the proceeds of the BEC scheme through various financial transactions using dozens of bank accounts that they directly and indirectly controlled. Ibeh’s alleged role in the scheme was to manage the money laundering by causing conspirators to open bank accounts, which he used to wire money domestically and internationally. Joyner’s alleged role in the scheme was to withdraw the proceeds of the fraud in cash, which he delivered to other conspirators, including Ibeh. Elkhebri’s alleged role in the scheme was to open bank accounts in his name and use his position as a bank employee to facilitate the opening of bank accounts in the name of both co-conspirators and victims.

Ibeh and Joyner are charged with conspiracy to commit money laundering and money laundering. If convicted, Ibeh and Joyner each face a maximum penalty of 20 years in prison. Elkhebri is charged with conspiracy to commit money laundering, money laundering, false entries in a bank’s books, and aggravated identity theft. If convicted of all charges, Elkhebri faces a mandatory minimum penalty of two years in prison and a maximum penalty of 52 years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after taking into account the U.S. Sentencing Guidelines and other statutory factors.

Raj Parekh, Acting U.S. Attorney for the Eastern District of Virginia; Christopher A. Nielsen, Inspector in Charge of the Analytics and Cyber Group of the U.S. Postal Inspection Service; and Matthew S. Miller, Special Agent in Charge of the U.S. Secret Service’s Washington Field Office, made the announcement.

Assistant U.S. Attorney Christopher Hood is prosecuting the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No 1:21-cr-200.

An indictment is merely an accusation. The defendants are presumed innocent until proven guilty.

Source: U.S. Attorney’s Office, Eastern District of Virginia


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Microsoft seizes 338 websites to disrupt rapidly growing ‘RaccoonO365’ phishing service
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Massive NPM Supply Chain Attack Hits Crypto Wallets
Category: ID TheftPhishing

Post navigation

← JDC Healthcare discloses ransomware incident; still figuring out who needs to be notified
Je: Staff shortages blamed for lost medical records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.