Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US

Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US

Four Ghanaian nationals orchestrating an international cybercrime operation that defrauded victims of over $100 million through sophisticated romance scams and business email compromise attacks have been extradited to the United States.

The criminal organization, led by Isaac Oduro Boateng, Inusah Ahmed, Derrick van Yeboah, and Patrick Kwame Asare, employed advanced social engineering techniques to target vulnerable individuals and businesses across America.

The cybercrime syndicate utilized a multi-vector approach, combining emotional manipulation through fabricated romantic relationships with technical exploitation of corporate email systems.

Google News

Their attack methodology involved creating elaborate fake personas to establish trust with elderly victims while simultaneously deploying business email compromise tactics to intercept and redirect corporate financial transactions.

The operation’s infrastructure spanned multiple continents, with command and control elements based in West Africa.

U.S. Attorney’s Office, Southern District of New York analysts identified the sophisticated laundering mechanisms employed by the organization, where stolen funds were systematically funneled through a hierarchical structure to “chairmen” who coordinated the criminal enterprise’s activities.

The investigation revealed that Boateng and Ahmed served as primary coordinators, directing subordinate operators in executing both romance fraud and corporate infiltration campaigns.

Social Engineering and Technical Implementation

The criminal organization’s technical arsenal combined traditional phishing methodologies with advanced psychological manipulation frameworks.

Their romance scam operations leveraged comprehensive victim profiling techniques, utilizing social media reconnaissance to craft personalized deception campaigns.

The attackers employed sophisticated communication protocols, maintaining multiple concurrent relationships while avoiding detection through compartmentalized operational security measures.

Their business email compromise attacks utilized domain spoofing and email header manipulation to bypass corporate security filters.

The technical implementation involved monitoring legitimate business communications, intercepting invoice payment requests, and substituting fraudulent banking details with remarkable precision.

This systematic approach enabled the organization to maintain operational continuity while processing millions in fraudulent transactions before detection.

Three defendants arrived in the United States on August 7, 2025, with extradition facilitated through international law enforcement cooperation between American authorities and Ghana’s Economic and Organized Crime Office.

Equip your SOC with full access to the latest threat data from ANY.RUN TI Lookup that can Improve incident response -> Get 14-day Free Trial


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.