Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US

Posted on August 12, 2025August 12, 2025 By CWS

4 Ghanaian nationals orchestrating a world cybercrime operation that defrauded victims of over $100 million via subtle romance scams and enterprise e mail compromise assaults have been extradited to america.

The felony group, led by Isaac Oduro Boateng, Inusah Ahmed, Derrick van Yeboah, and Patrick Kwame Asare, employed superior social engineering methods to focus on weak people and companies throughout America.

The cybercrime syndicate utilized a multi-vector strategy, combining emotional manipulation via fabricated romantic relationships with technical exploitation of company e mail techniques.

Their assault methodology concerned creating elaborate faux personas to determine belief with aged victims whereas concurrently deploying enterprise e mail compromise techniques to intercept and redirect company monetary transactions.

The operation’s infrastructure spanned a number of continents, with command and management parts primarily based in West Africa.

U.S. Legal professional’s Workplace, Southern District of New York analysts recognized the subtle laundering mechanisms employed by the group, the place stolen funds had been systematically funneled via a hierarchical construction to “chairmen” who coordinated the felony enterprise’s actions.

The investigation revealed that Boateng and Ahmed served as main coordinators, directing subordinate operators in executing each romance fraud and company infiltration campaigns.

Social Engineering and Technical Implementation

The felony group’s technical arsenal mixed conventional phishing methodologies with superior psychological manipulation frameworks.

Their romance rip-off operations leveraged complete sufferer profiling methods, using social media reconnaissance to craft personalised deception campaigns.

The attackers employed subtle communication protocols, sustaining a number of concurrent relationships whereas avoiding detection via compartmentalized operational safety measures.

Their enterprise e mail compromise assaults utilized area spoofing and e mail header manipulation to bypass company safety filters.

The technical implementation concerned monitoring reliable enterprise communications, intercepting bill cost requests, and substituting fraudulent banking particulars with exceptional precision.

This systematic strategy enabled the group to keep up operational continuity whereas processing tens of millions in fraudulent transactions earlier than detection.

Three defendants arrived in america on August 7, 2025, with extradition facilitated via worldwide regulation enforcement cooperation between American authorities and Ghana’s Financial and Organized Crime Workplace.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Extradited, Frauds, Hackers, Million, Romance, Scams

Post navigation

Previous Post: UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled
Next Post: Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments

Related Posts

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
Allianz Life Insurance Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News