HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Nigerian National Sentenced to 7 Years for $6M Business Email Compromise Scheme Targeting U.S. Companies

A Nigerian national received a 90‑month prison term for orchestrating a business‑email‑compromise campaign that stole about $6 million from U.S. businesses. The case underscores the persistent risk of credential‑based email fraud for third‑party risk managers.

🛡️ LiveThreat™ Intelligence · 📅 March 24, 2026· 📰 therecord.media
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
therecord.media

Nigerian National Sentenced to 7 Years for $6M Business Email Compromise Scheme Targeting U.S. Companies

What Happened — A 31‑year‑old Nigerian citizen, James Junior Aliyu, was sentenced in the United States to 90 months in prison for his role in an international business‑email‑compromise (BEC) operation that stole roughly $6 million from American businesses and individuals. The scheme, active since at least 2017, relied on hijacked corporate email accounts and spoofed payment instructions to divert legitimate wire transfers to fraud‑controlled bank accounts.

Why It Matters for TPRM

  • BEC attacks exploit weak email security and can be launched from any geography, exposing third‑party risk to any vendor that processes payments on behalf of clients.
  • The case highlights the financial impact of credential‑based fraud, underscoring the need for continuous monitoring of email authentication controls across the supply chain.
  • Successful prosecution demonstrates that law‑enforcement collaboration can mitigate ongoing threats, but the underlying tactics remain prevalent.

Who Is Affected — Financial services firms, SaaS platforms handling invoicing, and any organization that relies on email‑based payment approvals.

Recommended Actions

  • Verify that all third‑party vendors enforce DMARC, DKIM, and SPF for outbound email.
  • Implement multi‑factor authentication (MFA) on email and financial systems.
  • Conduct regular phishing simulations and train staff to recognize spoofed payment requests.
  • Review transaction monitoring rules for anomalous wire‑transfer patterns.

Technical Notes — The attackers gained unauthorized access to corporate mailboxes (likely via credential theft or phishing) and sent spoofed messages that appeared to originate from legitimate executives. No specific CVE was cited; the attack vector was social engineering and compromised credentials. Source: The Record

📰 Original Source
https://therecord.media/us-sentences-nigerian-national-to-7-years-fraud

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.