Feeds

Phishers jailed for lifting over £300k from student loan applicants

Met: Fraudsters' email scam pulled in bank details

Beginner's guide to SSL certificates

A UK-based phishing fraudster who netted an estimated £300K by targeting students was jailed for three-and-a-half years on Friday, London's Metropolitan Police confirmed.

Damola Olatunji, 37, tricked victims into submitting their banking details to bogus websites in response to dodgy emails supposedly related to student loans. Prospective marks were falsely told they needed to "update their banking details" in order to receive funds. In reality the submitted account details were used to loot funds, with amounts ranging from £1,000 to £5,000 slurped from compromised accounts. Olatunji managed to obtain the login details of 1,300 student accounts using the ruse, according to police.

The 37-year-old was convicted of fraud worth £304,000 and attempted fraud of £162,000 related to the student loan phishing scam. He was also found guilty of a separate £75,000 fraud against accounts held at the Halifax bank. The conspiracy to defraud the student loan company earned him three-and-a-half years behind bars. He was also sentenced to two years over the Halifax scam and one year for money laundering, with sentences to run concurrently to the main charge.

Separately, Amos Mwangi, 26, was recently jailed for three years and three months over the same type of student loan phishing scam. There's no evidence the duo were working together but they were both arrested as part of the same operation, involved raids at addresses in London and Manchester, last December. Computers seized from Mwangi revealed he was running numerous computer programs which enabled him to build phishing emails and register fake websites.

Four other suspects were arrested as part of the same raids last December.

Police estimate the group were collectively involved in attempts to steal an estimated total of more than £1.5m from the Student Loan Company.

"Mwangi and Olatunji were determined fraudsters who systematically targeted British students in order to steal large amounts of money," said DI Jason Tunn of the Met's Police Central e-Crime Unit (PCeU) in a statement. "Despite the complexity of the investigation, PCeU investigators working closely with the Student Loan Company and other partners were able to identify those responsible and bring them to justice." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
SMASH the Bash bug! Red Hat, Apple scramble for patch batches
'Applying multiple security updates is extremely difficult'
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.