Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sentry launches MCP monitoring tool

      August 14, 2025

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      From Line To Layout: How Past Experiences Shape Your Design Career

      August 13, 2025

      Hire React.js Developers in the US: How to Choose the Right Team for Your Needs

      August 13, 2025

      I’ve tested every Samsung Galaxy phone in 2025 – here’s the model I’d recommend on sale

      August 14, 2025

      Google Photos just put all its best editing tools a tap away – here’s the shortcut

      August 14, 2025

      Claude can teach you how to code now, and more – how to try it

      August 14, 2025

      One of the best work laptops I’ve tested has MacBook written all over it (but it’s even better)

      August 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Controlling Execution Flow with Laravel’s Sleep Helper

      August 14, 2025
      Recent

      Controlling Execution Flow with Laravel’s Sleep Helper

      August 14, 2025

      Generate Secure Temporary Share Links for Files in Laravel

      August 14, 2025

      This Week in Laravel: Filament 4, Laravel Boost, and Junie Review

      August 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      KDE Plasma 6 on Wayland: the Payoff for Years of Plumbing

      August 14, 2025
      Recent

      KDE Plasma 6 on Wayland: the Payoff for Years of Plumbing

      August 14, 2025

      FOSS Weekly #25.33: Debian 13 Released, Torvalds vs RISC-V, Arch’s New Tool, GNOME Perfection and More Linux Stuff

      August 14, 2025

      Ultimate ChatGPT-5 Prompt Guide: 52 Ideas for Any Task

      August 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»FBI, Ghana Authorities Bust $100 Million Romance Scam in Major International Extradition

    FBI, Ghana Authorities Bust $100 Million Romance Scam in Major International Extradition

    August 12, 2025

    FBI Busts Romance Scam

    The U.S. authorities have secured the extradition of three Ghanaian nationals accused of running a fraud operation that stole over $100 million from victims through romance scams and business email compromise (BEC) attacks.

    United States Attorney for the Southern District of New York, Jay Clayton, and FBI New York Field Office Assistant Director in Charge, Christopher G. Raia, announced the unsealing of an indictment against Isaac Oduro Boateng (36), also known as “Kofi Boat”; Inusah Ahmed (40), known as “Pascal”; Derrick Van Yeboah (40), known as “Van”; and Patrick Kwame Asare (39), known as “Borgar.”

    Boateng, Ahmed, and Van Yeboah arrived in the United States on August 7, 2025, after being extradited from Ghana, and are scheduled to appear before U.S. Magistrate Judge Robert W. Lehrburger. Asare remains at large. The case is assigned to U.S. District Judge Arun Subramanian.

    Romance Scams Targeting the Vulnerable

    Prosecutors allege that the four men were senior figures in a Ghana-based criminal organization operating between 2016 and May 2023. The group allegedly conducted romance scams to exploit vulnerable, often elderly, Americans and conducted elaborate business email compromise schemes to siphon funds from U.S. companies.

    Victims were contacted via social media, text messages, and online dating platforms.

    In romance scams, conspirators built fake romantic relationships to gain trust before requesting large sums of money under false pretenses. Many victims lived alone and were persuaded not only to send money but also to assist in laundering funds from other victims.

    In BEC schemes, the group allegedly hacked or spoofed legitimate business emails to trick companies into wiring payments to bank accounts controlled by the fraud ring. These accounts were often held by “money mules” or shell companies in industries ranging from auto sales to freight trucking.

    FBI Assistant Director Christopher G. Raia said:

    “Deceiving businesses using email compromise campaigns and tricking innocent elderly victims through fraudulent companionship to exploit their trust and finances is not merely appalling but illegal. The FBI will continue to ensure anyone who preys on companies and vulnerable Americans online is made to face the criminal justice system.”

    Laundering Millions to West Africa

    Once stolen, the funds were allegedly channelled through layers of middlemen who took a cut before transferring the rest to West Africa. Large portions of the proceeds were directed to “chairmen” — high-ranking leaders in the network — a role prosecutors say was held by both Boateng and Ahmed.

    According to the Department of Justice, individual transfers often exceeded several hundred thousand dollars. The scale of the operation reflects the growing global reach of cyber-enabled fraud, with networks capable of moving vast sums across continents while evading detection for years.

    Charges and Potential Sentences

    All four defendants face multiple federal charges:

    • Wire fraud conspiracy (maximum 20 years)
    • Wire fraud (maximum 20 years)
    • Money laundering conspiracy (maximum 20 years)
    • Conspiracy to receive stolen money (maximum 5 years)
    • Receipt of stolen money (maximum 10 years)

    If convicted on all counts, each defendant could face up to 75 years in prison. The charges are currently allegations, and the defendants are presumed innocent unless proven guilty.

    U.S. and Ghana Law Enforcement Cooperation

    The extradition was the result of extensive collaboration between U.S. and Ghanaian authorities, including Ghana’s Economic and Organized Crime Office, the Ghana Police Service – INTERPOL, the Cyber Security Authority, and the National Intelligence Bureau.

    The U.S. Department of Justice’s Office of International Affairs and Ghana’s Attorney-General’s Office International Cooperation Unit played key roles in securing the extradition.

    U.S. Attorney Jay Clayton commended the joint effort, stating:

    “Offshore scammers should know that we, the FBI, and our law enforcement partners will work around the world to combat online fraud and bring perpetrators to justice.”

    The Growing Threat of Romance Scams and BEC Fraud Case 

    This case comes amid rising trends in cybercrime, particularly in romance scams and BEC fraud, both of which have been identified as high-impact crimes by the FBI’s Internet Crime Complaint Center (IC3).

    According to the FBI’s 2024 Internet Crime Report, losses from internet-enabled crimes reached $16 billion last year, a 33% increase from 2023. Romance scams continue to disproportionately target older Americans, often leading to devastating financial and emotional consequences.

    BEC schemes remain one of the most financially damaging cybercrimes, as attackers exploit human trust and business communication vulnerabilities to reroute legitimate payments.

    The FBI report highlights that in the past five years, IC3 recorded 4.2 million complaints with over $50.5 billion in total losses. Since its inception in 2000, IC3 has received more than 9 million complaints, illustrating the scale and persistence of online fraud.

    A Global Problem with Local Impact

    While this fraud ring was based in Ghana, its reach extended deep into U.S. communities, draining life savings from elderly individuals and disrupting legitimate business operations. Prosecutors say the extradition underlines a critical message: international borders are no protection for cybercriminals.

    This high-profile prosecution also signals a growing willingness among nations to cooperate in tackling cybercrime. Ghana’s decision to extradite its nationals reflects strengthening law enforcement ties and the recognition that cyber fraud is a global threat requiring a unified response.

    What Happens Next

    Boateng, Ahmed, and Van Yeboah will face federal court proceedings in New York, where prosecutors from the U.S. Attorney’s Office’s Complex Frauds and Cybercrime Unit will lead the case. Assistant U.S. Attorneys Kevin Mead and Mitzi Steiner are handling the prosecution.

    Asare, still at large, is the subject of an ongoing international manhunt, with law enforcement urging anyone with information on his whereabouts to come forward.

    Protecting Against Similar Cyber Scams

    Authorities continue to advise the public to exercise caution in online interactions, especially with individuals they have never met in person. Key preventive measures include:

    • Verifying email requests for payments or sensitive data.
    • Being cautious of unsolicited online relationships that escalate quickly.
    • Avoiding sending money or personal information to unknown parties.
    • Consulting trusted friends or family before making financial commitments.

    The FBI encourages victims of romance scams or BEC attacks to file a report through the IC3.gov portal as quickly as possible to increase the chances of recovering lost funds.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleDutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
    Next Article WinRAR zero-day exploited in espionage attacks against high-value targets

    Related Posts

    Development

    Controlling Execution Flow with Laravel’s Sleep Helper

    August 14, 2025
    Development

    Generate Secure Temporary Share Links for Files in Laravel

    August 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-30169 – Aspect File Upload and Execute PHP Script Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6218 – WinRAR Directory Traversal Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-53727 – Microsoft SQL Server SQL Injection Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    Xbox Free Play Days adds Towerborne, Bassmaster, and Construction Simulator this weekend

    Operating Systems

    Highlights

    Machine Learning

    Sequential-NIAH: A Benchmark for Evaluating LLMs in Extracting Sequential Information from Long Texts

    April 24, 2025

    Evaluating how well LLMs handle long contexts is essential, especially for retrieving specific, relevant information…

    Bridging the gap between development and production: Seamless model lifecycle management with Amazon Bedrock

    May 30, 2025

    IPFire 2.29 Core Update 194: Tutte le novità del firewall GNU/Linux con kernel 6.12 LTS

    May 13, 2025

    CVE-2025-54439 – Samsung Electronics MagicINFO 9 Server File Upload Vulnerability

    July 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.