Feeds

UK court dishes out 13 years' porridge to e-fraudsters

Cyber-cops: £1m phishermen had 40 bogus bank sites

The Essential Guide to IT Transformation

Three fraudsters have been jailed for a combined total of 13 years and six months over their involvement in a sophisticated phishing fraud against UK and international banks.

Ayodeji Kareem, 38, Vincent Alonge, 31, and Babatunde Fafore, 41, were all jailed at a hearing at Snaresbrook Crown Court on Friday. All three defendants, who were arrested in August 2010 in raids in the UK and Ireland, had pleaded guilty to fraud back in May. Kareem was jailed for five years and five months, while Alonge was sent down for two years. Fafore was jailed for five years and seven months.

Together the trio participated in a crime that affected tens of thousands of victims and resulted in losses of millions of pounds.

Investigators reckons the frudsters compromised more than 900 bank accounts and 10,000 credit cards, raiding £599,000 from compromised banks accounts and stealing £570,000 from stolen credit cards in the process. The conmen harvested bank login details and other sensitive information after setting-up 40 bogus bank web-pages, promoted using spam emails. Attempted fraudulent transfers and transactions exceeded £4.2m.

Financial investigators are continuing attempts to unravel the fraud and confiscate the proceeds of the scam.

The case, codenamed Operation Dynamophon, was investigated by officers from the Met's Police Central e-Crime Unit. Irish police arrested Fafore, who was resident in County Cavan at the time of his arrest last year. Four further individuals arrested at the time of the original operation were released without charge.

In a statement, DI Colin Wetherill, Police Central e-Crime Unit, said: "In collaboration with law enforcement colleagues and industry partners both in the UK and overseas, we are working to identify and bring to justice those committing serious and organised offences of this nature online, and to reduce the harm they cause to innocent individuals and to the economy. These convictions represent a significant step forward.

"However, we all have a role to play in the protection of our private information and we would urge the public to exercise great care when supplying their personal details online, and to take the advice given at www.getsafeonline.org". ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.