Phishing scam convinces US government to pay $23.5 million to cyber criminals
The historic case has finally reached an end with the criminals facing huge fines and jail terms
The US Department of Defense (DoD) has confirmed it was the victim of a $23.5 million phishing scam in 2018, and that the criminal has finally been punished.
Forty-year-old California resident Sercan Oyuntur was trialled on 28 April and found guilty of committing multiple counts of fraud against the US government, as well as aggravated identity theft and making false statements to federal officers.
What is phishing? Five giveaways that show an email is a phishing attack The top 12 password-cracking techniques used by hackers
During a three-month window between June and September 2018, Oyuntur and his associates in Germany, Turkey, and New Jersey helped to send phishing emails to DoD contractors purporting to be communications from the government.
The emails contained links to spoofed web pages they created that appeared to mimic the real web page of the General Service Administration (GSA).
The emails and spoofed website encouraged the vendors to input their login credentials which could be used to access their account details, including the financial information required for the DoD to pay for goods and services.
The successful incident saw a supplier of jet fuel fall victim to the phishing scam and Oyuntur was able to use the login credentials to change the vendor’s payment details to his own, eventually leading to the DoD paying Oyuntur $23.5 million for jet fuel he did not supply.
Oyuntur opened a bank account registered to a shell company and used it in the scam. The shell company was created with assistance from an associate, Hurriyet Arslan, who owned a used car dealership in New Jersey.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
Arslan was responsible for opening the shell company, registering its phone number, finding an individual to pose as the company's owner, and opening the bank account itself.
The criminals had difficulty accessing all the funds after the DoD completed the payment and sought help from an associate in Turkey to forge a government contract, which they could show the bank, in a bid to convince it to release the full sum.
The combined maximum prison sentences for Oyuntur’s charges amount to 107 years, with all fines relating to the fraud charges also amounting to $3 million or twice the gross profits or loss relating to the offence, whichever is greater, the DoD said.
The remaining charges also bring a potential $250,000 fine or twice the gain or loss from the offence, whichever is greater.
Oyuntur’s sentencing will be determined later, while Arslan will be sentenced in June.
Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.