back to top
Saturday, November 9, 2024
advertise with us
HomeLifestyleBusinessHow the FBI Clamped Down Hushpuppi, Woodberry & Gang

How the FBI Clamped Down Hushpuppi, Woodberry & Gang

Hushpuppi: a life of luxury with cyber heist

By Abankula

In complaints filed before Illinois courts, FBI agents described in details how they were able to trail and smash two notorious Nigerian fraudsters, Ramon Olorunwa Abbas a.k.a Hushpuppi and Olalekan Ponle a.k.a Woodberry and gang.

The criminal complaints against the cyber fraudsters showed the FBI agents trailing them since last year, before the Dubai Police went for the harvest.

Though the two conmen are Nigerians, they operated in different ways in executing their cyber heists and the loot therefrom.

Real Face of Olalekan Ponle a.k.a Woodberry

Olalekan Ponle often asked his co-conspirators to convert his share into bitcoins.

Raymond, on the other hand, favours cash, the heist moving from several accounts he set up in Mexico, Romania and other parts of Europe, before getting to him.

In one daring effort, Hushpuppie planned to cyber-rob an English Premier League club.

Hushpuppi, real name Ramon Olorunwa Abbas was investigated by special agent ANDREW JOHN INNOCENTI.

Ponle on the other hand was investigated by special agent Ali Sadiq.

Hushpuppi by Andrew John Innocenti:

First, messages found on the iPhone of Co conspirator 1 (reviewed pursuant to a federal search warrant issued in this District) reflect that ABBAS, Co conspirator 1, and Co conspirator 2, with others, committed a BEC scheme that defrauded a victim in the United States of approximately $922,857.76, including approximately $396,050 that ABBAS, Co conspirator 1, and Co-conspirator 2 laundered while Co conspirator 2 was in Los Angeles,

California.

Second, ABBAS and Co conspirator 1 conspired to launder funds intended to be stolen through fraudulent wire transfers from a foreign financial institution (the “Foreign Financial Institution”), in which fraudulent wire transfers, totaling approximately €13 million (approximately USD $14.7 million), were sent to bank accounts around the world in February 2019. Co conspirator 1 conspired with the persons who initiated the fraudulent wire transfers, and also conspired with a number of others, including ABBAS, to launder the funds that were intended to be stolen. ABBAS, specifically, provided Co conspirator 1 with two bank accounts in Europe that ABBAS anticipated would each receive €5 million of the fraudulently obtained funds.

Other communications between ABBAS and Co conspirator 1 indicate that, in addition to these schemes, ABBAS and Co conspirator 1 conspired to launder tens, and at times hundreds, of millions of dollars that were proceeds of other fraudulent schemes and computer intrusions, including a fraudulent scheme to steal £100 m from an English Premier League football club.

In reviewing data from Co conspirator 1’s iPhone, I and another FBI employee saw messages reflecting that, in or around October 2019, ABBAS had conspired with Co conspirator 1 and Co conspirator 2 to commit a fraudulent wire transfer and money-laundering scheme, in which a U.S. victim (the “Victim Law Firm”) lost approximately $922,857.76. The messages reflected that part of the scheme, including acts in furtherance of the conspiracy, occurred while Co conspirator 2 was physically present in the Central District of California.

Records obtained from JP Morgan Chase Bank (“Chase”) for a bank account held in the U.S. (the “Chase Account”) reflect that the Chase Account received a wire transfer on October 15, 2019 for approximately $922,857.76 from the Victim Law Firm. On October 17, 2019, there was a wire transfer from the Chase Account to an account at Canadian Imperial Bank of Commerce (“CIBC”), in Toronto, Ontario, for approximately $396,050. Bank records reflect that the specific account at CIBC ended in 1716 (the “CIBC Account”), consistent with what is discussed below in paragraphs 21, 24, and 25. The remaining funds in the Chase Account were transferred to other accounts.

Based on review of data from Co conspirator 1’s iPhone, on or around October 17, 2019, ABBAS, using what appeared to be the Snap chat account “hushpuppi5,” sent an image of a Chase wire confirmation to Co conspirator 1. The image appeared to show a wire transfer form related to a transfer of approximately $396,050 from the Chase Account to the CIBC Account, which, based on other messages on Co conspirator 1’s iPhone, appears to have been held by Co conspirator 2.3

On April 14, 2020, I interviewed S.R., owner of the Victim Law Firm, about the above-referenced wire sent on October 17, 2019. On April 16, 2020, I interviewed N.C., who was an attorney and co-worker of S.R., and on May 21, 2020, I interviewed K.C., a paralegal of the Victim Law Firm. Based on these interviews, I learned the following:

The Victim Law Firm, which is located in New York State, was representing a client, A.D., in the refinance of real estate.

A.D. was refinancing his/her property with Citizens Bank. As part of the closing for this refinance, on October 15, 2019, K.C. sent a verification email to what appeared to be a Citizens Bank email address (later identified as a “spoofed” email address) requesting wire instructions. Per internal policy of the Victim Law Firm, all wire verification were to be sent to their firm via fax and followed-up by a phone call. K.C. received a fax message in response to her verification email with what was later determined to be fraudulent wire instructions to transfer the loan payoff amount of their client A.D. to the Chase Account. K.C. then called the phone number listed on the fax to verify the wire instructions.

NEITHER THE VICTIM LAW FIRM, NOR THEIR CLIENT AD, REALIZED THE FUNDS HAD BEEN FRAUDULENTLY TRANSFERRED TO THE CHASE ACCOUNT UNTIL LATER IN OCTOBER 2019. WHEN AD CHECKED HIS/HER ACCOUNT AND REALIZED THAT THE FUND FOR THE REFINANCE HAD NOT BEEN CREDITED, BY THIS TIME, ALL OF THE FUNDS HAD BEEN DEPLETED FROM THE CHASE ACCOUNT.

On October 15, 2019, K.C. initiated the wire transfer to the Chase Account for approximately $922,857.76.

Neither the Victim Law Firm, nor their client A.D., realized the funds had been fraudulently transferred to the Chase Account until later in October 2019, when A.D. checked his/her account and realized that the funds for the refinance had not been credited. By this time, all of the funds had been depleted from the Chase Account. (I further understand from K.C. that, as of June 25, 2020, no funds had been recovered.)

Messages on Co conspirator 1’s iPhone reflect that, at approximately the same time on October 17, 2019 that ABBAS sent Co conspirator 1 an image of the wire transfer confirmation for the transaction from the Chase Account to the CIBC Account, Coconspirator 1 was communicating with another phone number to confirm the wire had been deposited into the CIBC Account. Based on other messages on the iPhone and records obtained by the FBI, that phone number was used by Co conspirator 2.

The communications between Co conspirator 1 and Co conspirator 2 on October 17, 2019 included the following messages:

Co conspirator 1: Keep lookout for the 396 and so ur thing till u hear from me
Co conspirator 2: Ok will do
Co conspirator 2: I’m in La so how can I make sure??4

Co conspirator 2 also sent Co conspirator 1 a photograph showing a secure login to the CIBC Account in Co conspirator 2’s name. The account number ended in 1716, consistent with the account number that ABBAS sent to Co conspirator 1 in an image on October 17, 2019.

I reviewed international travel records from a law enforcement database, which showed that Co conspirator 2 traveled from Toronto, Canada to Los Angeles, California on October 16, 2019. This was one day before the wire transfer from the Chase Account to the CIBC Account in Co conspirator 2’s name. Further, as referenced above, Co conspirator 2 messaged Co conspirator 1 on October 17, 2019 that “I’m in La.” Travel records also show that Co conspirator 2 departed Los Angeles around October 23, 2019 for Canada. Taken together, this indicates that Co conspirator 2 was in Los Angeles at the time of the wire transfer.

Later in the day on October 17, 2019, while still in Los Angeles, Co conspirator 2 appeared to confirm the wire transfer in an iMessage found on Co conspirator 1’s iPhone:
Co conspirator 1: Did the big hit? Co conspirator 2: Yessir

Olalekan Ponle: Nigerian passport image

Olalekan Ponle a.k.a Woodberry:

Beginning no later than January 2019 and continuing until at least September 2019, OLALEKAN JACOB PONLE conspired with others to engage in BEC schemes to defraud several United States-based companies. These schemes resulted in attempted and actual losses to victim companies in the tens of millions of dollars.

As described below, as part of the scheme, PONLE directed money mules in the United States to open bank accounts in the names of victim companies. Proceeds from BEC schemes, ranging from hundreds of thousands of dollars to millions of dollars, were then wired by unwitting employees to the bank accounts opened by PONLE’s mules. PONLE then instructed the mules to convert the proceeds to Bitcoin and to send the proceeds of the BEC schemes to a bitcoin wallet that he owned and operated.

One of these BEC schemes involved a Chicago-based company (Victim Company A) that was defrauded out of $2,300,000. A second Chicago-based company (Victim Company K) was defrauded into sending wire transfers totaling $15,268,000.00. Preliminary block chain analysis indicates that PONLE received at least 1,494.71506296 bitcoin related to these BEC schemes, valued at approximately $6,599,499.98 at the time he received the proceeds.

As described in more detail below, money mules in the United States were approached by a person they knew as “Mark” or “Mark Kain.” “Mark” later directed them to open bank accounts in the names of victim companies. Those accounts received proceeds from the BEC schemes, and at “Mark’s” direction, the money mules converted proceeds to bitcoin and sent proceeds to “Mark”.

According to one of those money mules, Individual B, “Mark Kain” contacted Individual B using telephone number (323) 985-4088 (“the 4088 phone number”). According to records obtained from Dingtone, a messaging and Voice over Internet Protocol application, subscribing customer records for the 4088 phone number included the cellular telephone number 27793837890 (“the 7890 phone number”), which based on law enforcement database searches, is owned by a South African service provider.

Based on my review of chat transcripts from online messaging applications between PONLE and Individual B and a second money mule, Individual A, “Mark” instructed Individual B and Individual A to send money to the bitcoin wallet on at least nine occasions. Records obtained from Bitpay, a processor of cryptocurrency transactions, indicated that between approximately September 18, 2015 and November 29, 2016, the 16AtGJ BTC wallet made five purchases associated with the Gmail account hustleandbustle@gmail[.]com (the “hustle Gmail account”).

Based on records obtained from Apple, an iCloud account (Subject Account 1) was subscribed to by Jacob Olalekan, listing the 7890 phone number, the hustle Gmail account, and a physical address in Johannesburg, South Africa.

Based on my review of records from Apple, Subject Account 1 contained several identity documents and photographs of PONLE. These included a photo of a Nigerian passport with a photo of an individual named Olalekan Jacob Ponle, born in May 1991 in Lagos, Nigeria, a photo of a United Arab Emirates visa with a photo of an individual named Olalekan Jacob Ponle with the profession “marketing representative” and a photo of a United Arab Emirates Resident Identity Card with a photo of a Nigerian national named Olalekan Jacob Ponle.”

PM News

Kehinde Irinoye
Kehinde Irinoye
Chairman: Founder & Publisher - Concourse News
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!
- Advertisment -

Most Popular