The Federal Bureau of Investigation (FBI) this week announced the arrests of 65 individuals as part of an international effort to combat business email compromise (BEC) fraud.
BEC scammers typically target employees in charge of making or authorizing wire transfers, from either a compromised or a spoofed email account.
Using these accounts, the fraudsters send legitimate-looking requests for wire transfers to bank accounts that they control.
These attacks have been observed worldwide, and last year alone the FBI’s Internet Crime Complaint Center (IC3) received reports of attacks that caused adjusted losses close to $2.4 billion.
Named Operation Eagle Sweep, the newly announced BEC crackdown started in September and resulted in the arrests of suspects in the United States (42), Nigeria (12), South Africa (8), Canada (2), and Cambodia (1).
[ READ: FBI Warns of BEC Scams Abusing Virtual Meeting Platforms ]
According to the FBI, the law enforcement operation started in September 2021 and targeted BEC fraudsters believed to have caused more than $51 million in losses to over 500 victims in the US.
Among the arrestees, the FBI named Bright Osaghni and Osatohanmwen Oriakhi, both of Toronto, Canada, who targeted hundreds of victims in the US and Canada and caused estimated losses of more than $16 million.
Operation Eagle Sweep follows Operation Wire Wire in 2018 and Operation reWired in 2019, which resulted in the arrests of more than 300 individuals for their suspected involvement in BEC schemes.
Related: FBI: 649 Ransomware Attacks Reported on Critical Infrastructure Organizations in 2021
Related: Microsoft Disrupts Large-Scale BEC Campaign
Related: Microsoft Sees Spike in BEC Attacks Targeting Schools

More from Ionut Arghire
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
- Boxx Insurance Raises $14.4 Million in Series B Funding
Latest News
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
