Connect with us


BIG STORY

Hushpuppi In Fresh Trouble, Linked With North Korean Hackers Described As World Biggest Bank Robbers [US Dept Full Statement]

Published

on

Nigerian Ramon Olorunwa Abbas, a.k.a Hushpuppi, now incarcerated in California as he awaits trial for cyber fraud was linked on Friday, 19 February 2021 by the FBI to North Korean hackers, said to be the biggest bank robbers in the world.

The Justice Department in a detailed statement released Friday said Abbas took part in a “North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019.”

His role was as a collaborator with a North Korean money launderer, Ghaleb Alaumary, based in Mississauga, Ontario, Canada.

The 37-year-old Alaumary was one of the people charged today by the FBI for many criminal schemes. The others are three North Koreans.

“Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020”, according to the statement.

“Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

“With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.
“Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019”.

Abbas already has a case of his own.

Last year, the U.S. Attorney’s Office in Los Angeles charged him in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

In a July statement, the Justice Department referred to the Maltese bank attack as “a $14.7 million cyber-heist from a foreign financial institution.”

“Both the date and amount match that of the attack on Malta’s Bank of Valletta in February 2019”, reported Forbes.

Abbas, 38, was arrested in Dubai last year.

He arrived in the U.S. on July 3 to face criminal charges over allegations that he made “hundreds of millions of dollars” from business email compromise frauds and other scams.
His trial was to have commenced late last year but was delayed by the COVID-19 pandemic.
Read the full US Justice Department statement on the indictment of three North Korean military hackers involved in cyber heists running into over $1.3billion:

A federal indictment unsealed today charges three North Korean computer programmers with participating in a wide-ranging criminal conspiracy to conduct a series of destructive cyberattacks, to steal and extort more than $1.3 billion of money and cryptocurrency from financial institutions and companies, to create and deploy multiple malicious cryptocurrency applications, and to develop and fraudulently market a blockchain platform.

A second case unsealed today revealed that a Canadian-American citizen has agreed to plead guilty in a money-laundering scheme and admitted to being a high-level money launderer for multiple criminal schemes, including ATM “cash-out” operations and a cyber-enabled bank heist orchestrated by North Korean hackers.

“As laid out in today’s indictment, North Korea’s operatives, using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash, are the world’s leading bank robbers,” said Assistant Attorney General John C. Demers of the Justice Department’s National Security Division. “The Department will continue to confront malicious nation-state cyber activity with our unique tools and work with our fellow agencies and the family of norms abiding nations to do the same.”

“Today’s unsealed indictment expands upon the FBI’s 2018 charges for the unprecedented cyberattacks conducted by the North Korean regime,” said the FBI Deputy Director Paul Abbate. “The ongoing targeting, compromise, and cyber-enabled theft by North Korea from global victims was met with the outstanding, persistent investigative efforts of the FBI in close collaboration with U.S. and foreign partners. By arresting facilitators, seizing funds, and charging those responsible for the hacking conspiracy, the FBI continues to impose consequences and hold North Korea accountable for its/their criminal cyber activity.”

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” said Acting U.S. Attorney Tracy L. Wilkison for the Central District of California. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

“This case is a particularly striking example of the growing alliance between officials within some national governments and highly sophisticated cyber-criminals,” said U.S. Secret Service Assistant Director Michael R. D’Ambrosio. “The individuals indicted today committed a truly unprecedented range of financial and cyber-crimes: from ransomware attacks and phishing campaigns to digital bank heists and sophisticated money-laundering operations. With victims strewn across the globe, this case shows yet again that the challenge of cybercrime is, and will continue to be, a struggle that can only be won through partnerships, perseverance, and a relentless focus on holding criminals accountable.”

The hacking indictment filed in the U.S. District Court in Los Angeles alleges that Jon Chang Hyok (전창혁), 31; Kim Il (김일), 27; and Park Jin Hyok (박진혁), 36, were members of units of the Reconnaissance General Bureau (RGB), a military intelligence agency of the Democratic People’s Republic of Korea (DPRK), which engaged in criminal hacking. These North Korean military hacking units are known by multiple names in the cybersecurity community, including Lazarus Group and Advanced Persistent Threat 38 (APT38). Park was previously charged in a criminal complaint unsealed in September 2018.

The indictment alleges a broad array of criminal cyber activities undertaken by the conspiracy, in the United States and abroad, for revenge or financial gain. The schemes alleged include:

Cyberattacks on the Entertainment Industry: The destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for “The Interview,” a movie that depicted a fictional assassination of the DPRK’s leader; the December 2014 targeting of AMC Theatres, which was scheduled to show the film; and a 2015 intrusion into Mammoth Screen, which was producing a fictional series involving a British nuclear scientist taken prisoner in DPRK.

Cyber-Enabled Heists from Banks: Attempts from 2015 through 2019 to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta, and Africa by hacking the banks’ computer networks and sending fraudulent Society for Worldwide Interbank Financial Telecommunication (SWIFT) messages.

Cyber-Enabled ATM Cash-Out Thefts: Thefts through ATM cash-out schemes – referred to by the U.S. government as “FASTCash” – including the October 2018 theft of $6.1 million from BankIslami Pakistan Limited (BankIslami).

Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies from 2017 through 2020 involving the theft of sensitive data and deployment of other ransomware.

Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications from March 2018 through at least September 2020 – including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale – which would provide the North Korean hackers a backdoor into the victims’ computers.
Targeting of Cryptocurrency Companies and Theft of Cryptocurrency: Targeting of hundreds of cryptocurrency companies and the theft of tens of millions of dollars’ worth of cryptocurrency, including $75 million from a Slovenian cryptocurrency company in December 2017; $24.9 million from an Indonesian cryptocurrency company in September 2018; and $11.8 million from a financial services company in New York in August 2020 in which the hackers used the malicious CryptoNeuro Trader application as a backdoor.

Spear-Phishing Campaigns:

Multiple spear-phishing campaigns from March 2016 through February 2020 that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, the U.S.Department of State, and the U.S. Department of Defense.

Marine Chain Token and Initial Coin Offering:

Development and marketing in 2017 and 2018 of the Marine Chain Token to enable investors to purchase fractional ownership interests in marine shipping vessels, supported by a blockchain, which would allow the DPRK to secretly obtain funds from investors, control interests in marine shipping vessels, and evade U.S. sanctions.

According to the allegations contained in the hacking indictment, which was filed on Dec. 8, 2020, in the U.S. District Court in Los Angeles and unsealed today, the three defendants were members of units of the RGB who were at times stationed by the North Korean government in other countries, including China and Russia. While these defendants were part of RGB units that have been referred to by cybersecurity researchers as Lazarus Group and APT38, the indictment alleges that these groups engaged in a single conspiracy to cause damage, steal data and money, and otherwise further the strategic and financial interests of the DPRK government and its leader, Kim Jong Un.

Money Launderer Charged in California and Georgia

Federal prosecutors today also unsealed a charge against Ghaleb Alaumary, 37, of Mississauga, Ontario, Canada, for his role as a money launderer for the North Korean conspiracy, among other criminal schemes. Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020. Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.

Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019. Last summer, the U.S. Attorney’s Office in Los Angeles charged Abbas in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

Accompanying Mitigation Efforts

Throughout the investigation, the FBI and the Justice Department provided specific information to victims about how they had been targeted or compromised, as well as information about the tactics, techniques, and procedures (TTPs) used by the hackers with the goals of remediating any intrusion and preventing future intrusions. That direct sharing of information took place in the United States and in foreign countries, often with the assistance of foreign law enforcement partners. The FBI also collaborated with certain private cybersecurity companies by sharing and analyzing information about the intrusion TTPs used by the members of the conspiracy.

In addition to the criminal charges, the FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, in collaboration with the U.S. Department of Treasury, today released a joint cybersecurity advisory and malware analysis reports (MARs) regarding North Korean cryptocurrency malware. The joint cybersecurity analysis and MARs highlight the cyber threat North Korea – which is referred to by the U.S. government as HIDDEN COBRA – poses to cryptocurrency and identify malware and indicators of compromise related to the “AppleJeus” family of malware (the name given by the cybersecurity community to a family of North Korean malicious cryptocurrency applications that includes Celas Trade Pro, WorldBit-Bot, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale). The joint cybersecurity advisory and MARs collectively provide the cybersecurity community and public with information about identifying North Korean malicious cryptocurrency applications, avoiding intrusions, and remedying infections.

The U.S. Attorney’s Office and FBI also obtained seizure warrants authorizing the FBI to seize cryptocurrency stolen by the North Korean hackers from a victim in the indictment – a financial services company in New York – held at two cryptocurrency exchanges. The seizures include sums of multiple cryptocurrencies totalling approximately $1.9 million, which will ultimately be returned to the victim.

Jon, Kim, and Park are charged with one count of conspiracy to commit computer fraud and abuse, which carries a maximum sentence of five years in prison, and one count of conspiracy to commit wire fraud and bank fraud, which carries a maximum sentence of 30 years in prison.

In relation to the case filed in Los Angeles, Alaumary has agreed to plead guilty to one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison.

The charges contained in the indictment are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt.

The investigation of Jon, Kim, and Park was led by the FBI’s Los Angeles Field Office, which worked closely with the FBI’s Charlotte Field Office. The U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center provided substantial assistance. The FBI’s Cyber Division also provided substantial assistance.

The investigations of Alaumary were conducted by the U.S. Secret Service’s Savannah Field Office, FBI’s Los Angeles Field Office, and the U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center. The FBI’s Criminal Investigative Division also provided substantial assistance.

The case against Jon, Kim, and Park is being prosecuted by Assistant U.S. Attorneys Anil J. Antony and Khaldoun Shobaki of the Cyber and Intellectual Property Crimes Section, with substantial assistance from Trial Attorney Scott Claffee of the Department of Justice National Security Division’s Counterintelligence and Export Control Section.

Assistant U.S. Attorneys Antony and Shobaki are also prosecuting the case against Alaumary, in which the U.S. Attorney’s Office for the Southern District of Georgia and the Criminal Division’s Computer Crimes and Intellectual Property Section (CCIPS) provided substantial assistance. Assistant U.S. Attorneys Antony and Shobaki, along with Assistant U.S. Attorney Jonathan Galatzan of the Asset Forfeiture Section, also obtained the seizure warrants for cryptocurrency stolen from the financial services company in New York.

The Criminal Division’s Office of International Affairs provided assistance throughout these investigations, as did many of the FBI’s Legal Attachés, as well as foreign authorities around the world. Numerous victims cooperated and provided valuable assistance.

 

Source: PM News

BIG STORY

Stop The Rumour, The Port Harcourt Refinery Is Working — Stakeholders, Community Leaders

Published

on

  • Peter Obi Commends the NNPCL for reviving the refinery

Stakeholders and community leaders around the Port Harcourt Refinery have doused the groundswell of rumours and speculations that the recently revived and restreamed refinery was not working.

Last Tuesday, the Nigeria National Petroleum Company Limited, NNPCL, announced the “safe and successful restart of the 60,000 barrels-per-day Old Port Harcourt Refinery,” which it stated marks a significant step forward after years of operational challenges and underperformance and also “signifies a new era of energy independence and economic growth for our nation.”

However, naysayers went to town disclaiming the news, saying the corporation was lying about its revival of the refinery. Interestingly, Dibia Isaiah, Chief Security Officer, Alesa Kingdom, Rivers State, and NNPC Pipelines & Storage Company Loader, said in a viral video, “I am one of the loaders from the host community and NPSC. As you can see, the refinery is operational and running smoothly. This morning, I have already loaded four trucks. We are delighted that business has finally commenced after many years. The refinery has given us products, so now we are loading, and tomorrow we are loading. This time is a very busy period for us.”

Also, former Labour Party presidential candidate, Dr Peter Obi, has commended the Malam Mele Kyari-led NNPCL for “fulfilling the long-standing promise of revamping the old Port Harcourt refinery.” He added, “The refinery boasts an installed production capacity of 60,000 barrels of crude oil per day. Approximately 200 trucks are expected to load products daily from the refinery. Nigerians now await the corresponding impact and benefits on pump prices and the overall economy.”

Obi further said that the news of the Port Harcourt Refinery’s revival is promising, “as it is expected to boost productivity, improve transportation, and alleviate economic burdens across the country.” He signed off the statement with his signature ‘A new Nigeria is POssible.”

 

Continue Reading

BIG STORY

CBN To Retire 1,000 Employees With N50bn Severance Package

Published

on

The Central Bank of Nigeria is reportedly preparing to retire around 1,000 employees as part of a strategic workforce realignment.

A severance package valued at over N50 billion has been allocated to facilitate the exercise.

An insider revealed that the retirement initiative is aimed at streamlining operations and reducing the workforce under the leadership of the bank’s Governor, Olayemi Cardoso.

According to Daily Trust, a circular released three weeks ago by the CBN stated that the application for the Early Exit Package (EPP) is open to all staff categories, with the application deadline set for Saturday, December 7.

Those exempted include employees who have not yet been confirmed or have served less than one year “as of the date of publication, with the effective date of exit set at 31 December 2024.”

Officials confirmed (to Daily Trust) that the apex bank is targeting the retirement of over 1,000 employees.

The officials, speaking on the condition of anonymity, stated that at least 860 staff members from various departments have already applied for the EPP.

The management described the EEP as a voluntary program offering eligible employees an incentive to exit the CBN early, “while providing employees seeking other career options a great opportunity for early exit.”

It was emphasized that once employees submit their applications, they cannot change their minds, as all completed and submitted applications are final.

The EEP outlines that financial incentives for senior supervisors to deputy managers will be based on the remaining period of service, up to a maximum of 60 months of the current grade’s gross annual emoluments.

Additionally, it states that financial incentives for managers will be for the remaining period of service, up to a maximum of 36 months of the current grade’s gross annual emoluments.

“Financial incentives for all other cadres of staff shall be for the remaining period in service, up to a maximum of 18 months of current grade gross annual emoluments,” the document added.

A staff member, who spoke to Daily Trust, said, “The way they dated the offer, you’ll know that the target is actually from senior supervisors to deputy managers. If you look at it, they’re mostly those that came in within the nine years of Governor Emefiele.

“For instance, I’ve worked for four years in the bank; the package they’re giving me is between N92 million to N97 million.

“Some others have worked up to a manager level and are only entitled to N64.5 million. So, the more time you have to go, the more money they pay you because you know, for them, you don’t have gratuity,” the staff member explained.

Another staff member shared with Daily Trust that during a webinar on Friday, the Human Resources Department expressed the bank’s intent to achieve its target number for the EEP.

“There is serious tension, serious apprehension. You can imagine the atmosphere. It is terrible.

“As of Friday, there were 860 people so far that have indicated interest in the EEP,” the staff member said.

When Daily Trust reached out to the CBN for comments on the decision to retire about 1,000 employees, the bank’s Director of Corporate Communication, Hakama Sidi Ali, neither answered calls nor responded to text messages.

Continue Reading

BIG STORY

Flamestar Empowerment Initiative: Breaking Cycles Of Poverty, Transforming Lives

Published

on

In a bold effort to combat poverty, hunger, and hopelessness among vulnerable children, Flamestar Empowerment Initiative (FEI) is emerging as a transformative force in Nigeria’s social development landscape.

This dynamic non-governmental organization (NGO) is dedicated to creating sustainable, community-led solutions that inspire hope and provide opportunities for children and families.

Founded on the principle that no child’s future should be left to chance, Flamestar Empowerment Initiative focuses on breaking cycles of hardship, steering children away from crime and exploitation, and opening doors to education, mentorship, and personal growth.

At the core of its mission is education, which Flamestar Empowerment Initiative views as the foundation of empowerment. Through scholarships, school supplies, and feeding programs for underprivileged families, the NGO ensures that children who might otherwise be left behind gain access to quality learning opportunities.

The organization also ensures the attainment of sustainable development goals (SDGs) including Quality Education, No Poverty, Gender Equality and Zero Hunger for children and families.

A key focus of the organizations work is rescuing children from paths of exploitation. The NGO plans to save many young lives from child labor, trafficking, and abuse. These children will be provided with safe spaces to play, learn, and heal from trauma, as well as access to counseling and peer support groups to rebuild their confidence and envision brighter futures.

In addition to its grassroots efforts, Flamestar Empowerment Initiative will actively raise awareness about child exploitation and advocates for stronger child protection policies. By partnering with other NGOs and local authorities, the organization will be contributing to systemic changes that safeguard vulnerable populations.

However, it’s mission extends beyond individual children. The organization recognizes that breaking the cycle of poverty requires uplifting entire communities. By engaging parents, caregivers, and community leaders, it fosters sustainable, long-term development.

The NGO’s impact will be further amplified through strategic collaborations. By supporting smaller organizations with resources, training, and mentorship, Flamestar Empowerment Initiative creates a ripple effect, extending its reach to more communities and children in need.

Through this enablement initiative, dozens of smaller NGOs will be able to strengthen their capacity, ensuring that more children benefit from targeted interventions. As a result, countless children will now be able attend school, excel academically, and pursue their dreams while inspiring the next generation.

Looking ahead, Flamestar Empowerment Initiative plans to deepen its focus on sustainable development. Expanding educational initiatives and launching new empowerment programs in underserved communities are at the forefront of its vision.

As part of its initiative for 2024, Flamestar Empowerment Initiative is planning a charity drive tagged ‘December Charity Drive-“Feed Lagos1000”

Slatted for December 20, 2024, at Mende, Maryland, Lagos, Nigeria, the NGO plans to distribute food packages to 1,000 people, providing them with essentials for the month thus bringing a sense of relief and celebration during the festive season.

Emphasizing on the objective of Flamestar Empowerment Initiative, Ms. Tosin Lewis, Director of Communications, Flamestar Empowerment Initiative said: “A key focus of the NGO’s work is rescuing children from paths of exploitation. No doubt, Flamestar Empowerment Initiative has set itself to become a beacon of hope for countless children and families, breaking cycles of poverty, hunger, and crime while transforming lives and reshaping communities.

Continue Reading



 

Join Us On Facebook

Most Popular