SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Nigerian Scam Baiting - Let's Discuss the Modalities

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: Glenn Petersen5/7/2018 9:46:34 AM
  Read Replies (1) of 130
 
Nigeria's Internet fraudsters zero in on corporate email accounts

Paul Carsten
Reuters
May 3, 2018

ABUJA (Reuters) - West Africa’s infamous internet scammers have evolved, dropping their impersonations of online love interests, princes and U.S. soldiers in favor of hijacking corporate emails, costing businesses hundreds of millions of dollars a year.



A cyber cafe is seen beside a bank automated machine in the Ogba district in Nigeria's commercial capital Lagos, Nigeria May 3, 2018. REUTERS/Akintunde Akinleye
-----------------------------------------------------------------

It is a much more lucrative venture that works by gaining access to corporate email login details or passing off almost-identical addresses as the real deal, a scam known as Business Email Compromise (BEC), according to a report by cybersecurity firm CrowdStrike issued on Thursday.

These Nigerian rackets now dwarf other types of online criminal theft, amounting to at least $5.3 billion of losses between October 2013 and the end of 2016, said CrowdStrike and the U.S. FBI’s Internet Crime Complaint Center (IC3).

“There’s a disproportionate amount of criminal gains they get from it,” Adam Meyers, vice president of intelligence at California-based CrowdStrike, told Reuters. “The lion’s share of ill-gotten, fraudulent money is around these business email compromise attacks. It’s a huge problem for our customer set.”

Nigeria has become one of the hubs of BEC. Nigerian online fraudsters, known as “Yahoo boys”, became notorious for trying to pass themselves off as people in financial need or Nigerian princes offering an outstanding return on an investment.

The capers became known as “419 scams” after the section of the national penal code that dealt - ineffectively - with fraud.

Yahoo boys even impersonated a U.S. forces commander in Afghanistan to defraud people by asking for help in recovering the assets of deceased soldiers. It forced the commander to issue a Facebook statement saying he would never try to contact anyone asking for financial help.

Now the scammers have bigger fish to fry, with the potential gains amounting to hundreds of millions of dollars a year, according to CrowdStrike.

Behind the fraudsters is an organized crime network with its hands in human trafficking, drugs, prostitution, money laundering and email fraud and cybercrime, the CrowdStrike report said. “The magnitude of this criminal threat has only recently begun to be understood,” it said.

The Black Axe gang sprang from Nigerian universities and now extends from Africa to North America, Europe and Asia. Its targets have ranged from semiconductor makers to schools in U.S. states including Connecticut and Minnesota, passing themselves off as executives and lawyers to trick employees into wiring sometimes millions of dollars a day into bank accounts.

From there, the money is quickly laundered through a series of bank accounts that can be traced to Hong Kong and China, where the trail often goes cold because diverging regulations foil monitoring, CrowdStrike’s Meyers said.

With that money, the Nigerian scammers are often enjoying the high life, said Meyers, noting social media accounts filled with pictures of them posing with luxury Mercedes cars, gold watches, jewellery and champagne.

“It’s really hard to stop; you can’t stop it with anti-virus or any kind of software, it’s really kind of a human problem.”

Reporting by Paul Carsten; Editing by Mark Heinrich

reuters.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext