Subscribe For Free Updates!

We'll not spam mate! We promise.

Sunday, 21 February 2021

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies

 

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies

A 66-year-old woman, Alhaja Muslimot Morenikeji Salami, who was reportedly attacked by some suspected Fulani herdsmen in Ogun state has died.

 

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies

 

It was gathered that Salami was attacked by the assailants while going to her site in the Oru-Awa Road in the Ijebu-North Local Government Area on Monday, January 11, 2021.

 

Alhaja Salami died on Tuesday, February 16 and was laid to rest the next day, Wednesday, February 17. 

 

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies

 

According to reports, Salami ran into some herds and attempted to make a quick reverse but was caught by the attackers.

 

The attackers numbering about eight reportedly emerged from the bush, cut off one of her fingers and shattered her jaw with bullets.

 

The victim was said to have been taken to a few hospitals including the state-owned Olabisi Onabanjo University Teaching Hospital but was rejected. She had to travel to the Lagos State Hospital, Ikeja, before she could get treatment.

 

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies

 

Spokesperson of the command, Abimbola Oyeyemi, who confirmed the incident then said three suspects had been arrested.

"Those people have a piece of land between Oru and Ago Iwoye. They went to inspect the land. One Alhaja who was going with them had excused herself with the promise that she would join them on the land," said Oyeyemi. 

 

"On getting to the land, they discovered that some Fulanis were attacking a labourer hired to clear the land in question. Those people immediately ran to those in the neighbourhood and in the process, the Fulanis left the victim and took to their heels. Unknown to the Alhaja, on her way to join the people, the Fulanis laid in ambush for her and opened fire on the vehicle she was driving. The woman was hit by a bullet and the Fulanis, who perpetrated the crime, ran away.

 

"When the police were informed, they went to the scene and could not find any of them but they saw the cattle they left behind. The police, in conjunction with the local vigilante group and hunters didn’t allow the cattle to leave the spot. Around 10pm, three Fulani men came to the spot with the aim of taking away the cattle and the police apprehended them. They have been transferred to the police headquarters in Eleweran. They have strong connection to the crime."

 

66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies 66-year-old woman attacked by suspected Fulani herdsmen in Ogun dies


Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

 

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

Nigerians have slammed Destiny Etiko for the choice of outfit she wore to visit Kogi State Governor, Yahaya Bello.

 

The actress took to her Instagram account to share a photo of herself wearing a clinging jumpsuit while with Governor Yahaya Bello in his office.

 

Followers accused her of dressing inappropriately for the occasion.

 

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

 

She had to block followers from posting comments on the post but that didn't deter them. They took to her other posts to leave comments criticising her.

 

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello

Destiny Etiko slammed for outfit she wore to visit Governor Yahaya Bello


FBI links Hushpuppi to North Korean bank robbers and money launderers

 

FBI links Hushpuppi to North Korean bank robbers and money launderers

The Federal Bureau of Investigation FBI has linked Instagram celebrity, Ramon Olorunwa Abbas, a.k.a Hushpuppi, to North Korean hackers said to be the biggest bank robbers in the world.

 

The Justice Department in a detailed statement released on Friday, February 19, alleged that Hushpuppi took part in a “North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019.” According to the statement, his role was as a collaborator with a North Korean money launderer, Ghaleb Alaumary, 37, based in Mississauga, Ontario, Canada.

 

“Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020.

“Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

“With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018.

“Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019”the statement read

 

Hushpuppi was arrested in Dubai in June 2020, and extradited to the US where he is being charged by the United States Attorney’s Office in Los Angeles with conspiring to launder hundreds of millions of dollars from “business email compromise” (BEC) frauds and other scams.

 

His trial was to have commenced late last year, but was delayed by the COVID-19 pandemic.

 

Read the full US Justice Department statement on Hushpuppi's alleged involvement with the three North Korean military hackers

A federal indictment unsealed today charges three North Korean computer programmers with participating in a wide-ranging criminal conspiracy to conduct a series of destructive cyberattacks, to steal and extort more than $1.3 billion of money and cryptocurrency from financial institutions and companies, to create and deploy multiple malicious cryptocurrency applications, and to develop and fraudulently market a blockchain platform.

A second case unsealed today revealed that a Canadian-American citizen has agreed to plead guilty in a money laundering scheme and admitted to being a high-level money launderer for multiple criminal schemes, including ATM “cash-out” operations and a cyber-enabled bank heist orchestrated by North Korean hackers.

“As laid out in today’s indictment, North Korea’s operatives, using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash, are the world’s leading bank robbers,” said Assistant Attorney General John C. Demers of the Justice Department’s National Security Division.

“The Department will continue to confront malicious nation state cyber activity with our unique tools and work with our fellow agencies and the family of norms abiding nations to do the same.”

“Today’s unsealed indictment expands upon the FBI’s 2018 charges for the unprecedented cyberattacks conducted by the North Korean regime,” said the FBI Deputy Director Paul Abbate.

“The ongoing targeting, compromise, and cyber-enabled theft by North Korea from global victims was met with the outstanding, persistent investigative efforts of the FBI in close collaboration with U.S. and foreign partners. By arresting facilitators, seizing funds, and charging those responsible for the hacking conspiracy, the FBI continues to impose consequences and hold North Korea accountable for its/their criminal cyber activity.”

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” said Acting U.S. Attorney Tracy L. Wilkison for the Central District of California.

“The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

“This case is a particularly striking example of the growing alliance between officials within some national governments and highly sophisticated cyber-criminals,” said U.S. Secret Service Assistant Director Michael R. D’Ambrosio.

“The individuals indicted today committed a truly unprecedented range of financial and cyber-crimes: from ransomware attacks and phishing campaigns, to digital bank heists and sophisticated money laundering operations. With victims strewn across the globe, this case shows yet again that the challenge of cybercrime is, and will continue to be, a struggle that can only be won through partnerships, perseverance, and a relentless focus on holding criminals accountable.”

The hacking indictment filed in the U.S. District Court in Los Angeles alleges that Jon Chang Hyok (???), 31; Kim Il (??), 27; and Park Jin Hyok (???), 36, were members of units of the Reconnaissance General Bureau (RGB), a military intelligence agency of the Democratic People’s Republic of Korea (DPRK), which engaged in criminal hacking. These North Korean military hacking units are known by multiple names in the cybersecurity community, including Lazarus Group and Advanced Persistent Threat 38 (APT38). Park was previously charged in a criminal complaint unsealed in September 2018.

The indictment alleges a broad array of criminal cyber activities undertaken by the conspiracy, in the United States and abroad, for revenge or financial gain. The schemes alleged include:

Cyberattacks on the Entertainment Industry: The destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for “The Interview,” a movie that depicted a fictional assassination of the DPRK’s leader; the December 2014 targeting of AMC Theatres, which was scheduled to show the film; and a 2015 intrusion into Mammoth Screen, which was producing a fictional series involving a British nuclear scientist taken prisoner in DPRK.

Cyber-Enabled Heists from Banks: Attempts from 2015 through 2019 to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta, and Africa by hacking the banks’ computer networks and sending fraudulent Society for Worldwide Interbank Financial Telecommunication (SWIFT) messages.

Cyber-Enabled ATM Cash-Out Thefts: Thefts through ATM cash-out schemes – referred to by the U.S. government as “FASTCash” – including the October 2018 theft of $6.1 million from BankIslami Pakistan Limited (BankIslami).

Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies from 2017 through 2020 involving the theft of sensitive data and deployment of other ransomware.

Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications from March 2018 through at least September 2020 – including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale – which would provide the North Korean hackers a backdoor into the victims’ computers.

Targeting of Cryptocurrency Companies and Theft of Cryptocurrency: Targeting of hundreds of cryptocurrency companies and the theft of tens of millions of dollars’ worth of cryptocurrency, including $75 million from a Slovenian cryptocurrency company in December 2017; $24.9 million from an Indonesian cryptocurrency company in September 2018; and $11.8 million from a financial services company in New York in August 2020 in which the hackers used the malicious CryptoNeuro Trader application as a backdoor.

Spear-Phishing Campaigns: Multiple spear-phishing campaigns from March 2016 through February 2020 that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, the U.S.Department of State, and the U.S. Department of Defense.

Marine Chain Token and Initial Coin Offering: Development and marketing in 2017 and 2018 of the Marine Chain Token to enable investors to purchase fractional ownership interests in marine shipping vessels, supported by a blockchain, which would allow the DPRK to secretly obtain funds from investors, control interests in marine shipping vessels, and evade U.S. sanctions.

According to the allegations contained in the hacking indictment, which was filed on Dec. 8, 2020, in the U.S. District Court in Los Angeles and unsealed today, the three defendants were members of units of the RGB who were at times stationed by the North Korean government in other countries, including China and Russia. While these defendants were part of RGB units that have been referred to by cybersecurity researchers as Lazarus Group and APT38, the indictment alleges that these groups engaged in a single conspiracy to cause damage, steal data and money, and otherwise further the strategic and financial interests of the DPRK government and its leader, Kim Jong Un.

Money Launderer Charged in California and Georgia

Federal prosecutors today also unsealed a charge against Ghaleb Alaumary, 37, of Mississauga, Ontario, Canada, for his role as a money launderer for the North Korean conspiracy, among other criminal schemes. Alaumary agreed to plead guilty to the charge, which was filed in the U.S. District Court in Los Angeles on Nov. 17, 2020. Alaumary was a prolific money launderer for hackers engaged in ATM cash-out schemes, cyber-enabled bank heists, business email compromise (BEC) schemes, and other online fraud schemes. Alaumary is also being prosecuted for his involvement in a separate BEC scheme by the U.S. Attorney’s Office for the Southern District of Georgia.

With respect to the North Korean co-conspirators’ activities, Alaumary organized teams of co-conspirators in the United States and Canada to launder millions of dollars obtained through ATM cash-out operations, including from BankIslami and a bank in India in 2018. Alaumary also conspired with Ramon Olorunwa Abbas, aka “Ray Hushpuppi,” and others to launder funds from a North Korean-perpetrated cyber-enabled heist from a Maltese bank in February 2019. Last summer, the U.S. Attorney’s Office in Los Angeles charged Abbas in a separate case alleging that he conspired to launder hundreds of millions of dollars from BEC frauds and other scams.

Accompanying Mitigation Efforts

Throughout the investigation, the FBI and the Justice Department provided specific information to victims about how they had been targeted or compromised, as well as information about the tactics, techniques, and procedures (TTPs) used by the hackers with the goals of remediating any intrusion and preventing future intrusions. That direct sharing of information took place in the United States and in foreign countries, often with the assistance of foreign law enforcement partners. The FBI also collaborated with certain private cybersecurity companies by sharing and analyzing information about the intrusion TTPs used by the members of the conspiracy.

In addition to the criminal charges, the FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, in collaboration with the U.S. Department of Treasury, today released a joint cybersecurity advisory and malware analysis reports (MARs) regarding North Korean cryptocurrency malware. The joint cybersecurity analysis and MARs highlight the cyber threat North Korea – which is referred to by the U.S. government as HIDDEN COBRA – poses to cryptocurrency and identify malware and indicators of compromise related to the “AppleJeus” family of malware (the name given by the cybersecurity community to a family of North Korean malicious cryptocurrency applications that includes Celas Trade Pro, WorldBit-Bot, Union Crypto Trader, Kupay Wallet, CoinGo Trade, Dorusio, CryptoNeuro Trader, and Ants2Whale). The joint cybersecurity advisory and MARs collectively provide the cybersecurity community and public with information about identifying North Korean malicious cryptocurrency applications, avoiding intrusions, and remedying infections.

The U.S. Attorney’s Office and FBI also obtained seizure warrants authorizing the FBI to seize cryptocurrency stolen by the North Korean hackers from a victim in the indictment – a financial services company in New York – held at two cryptocurrency exchanges. The seizures include sums of multiple cryptocurrencies totalling approximately $1.9 million, which will ultimately be returned to the victim.

Jon, Kim, and Park are charged with one count of conspiracy to commit computer fraud and abuse, which carries a maximum sentence of five years in prison, and one count of conspiracy to commit wire fraud and bank fraud, which carries a maximum sentence of 30 years in prison.

In relation to the case filed in Los Angeles, Alaumary has agreed to plead guilty to one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison.

The charges contained in the indictment are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt.

The investigation of Jon, Kim, and Park was led by the FBI’s Los Angeles Field Office, which worked closely with the FBI’s Charlotte Field Office. The U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center provided substantial assistance. The FBI’s Cyber Division also provided substantial assistance.

The investigations of Alaumary were conducted by the U.S. Secret Service’s Savannah Field Office, FBI’s Los Angeles Field Office, and the U.S. Secret Service’s Los Angeles Field Office and Global Investigative Operations Center. The FBI’s Criminal Investigative Division also provided substantial assistance.

The case against Jon, Kim, and Park is being prosecuted by Assistant U.S. Attorneys Anil J. Antony and Khaldoun Shobaki of the Cyber and Intellectual Property Crimes Section, with substantial assistance from Trial Attorney Scott Claffee of the Department of Justice National Security Division’s Counterintelligence and Export Control Section.

Assistant U.S. Attorneys Antony and Shobaki are also prosecuting the case against Alaumary, in which the U.S. Attorney’s Office for the Southern District of Georgia and the Criminal Division’s Computer Crimes and Intellectual Property Section (CCIPS) provided substantial assistance. Assistant U.S. Attorneys Antony and Shobaki, along with Assistant U.S. Attorney Jonathan Galatzan of the Asset Forfeiture Section, also obtained the seizure warrants for cryptocurrency stolen from the financial services company in New York.

The Criminal Division’s Office of International Affairs provided assistance throughout these investigations, as did many of the FBI’s Legal Attachés, as well as foreign authorities around the world. Numerous victims cooperated and provided valuable assistance.''

Ifuennada shows off her bare butt in more racy photos

 

Ifuennada shows off her bare butt in more racy photos

Reality TV star, Ifuennada, who is currently on holiday in Maldives Island, shared more racy photos of herself at the beach. See the photos below

 

Ifuennada shows off her bare butt in more racy photos

Ifuennada shows off her bare butt in more racy photos


E-Money gifts his friends luxury cars on his birthday

 

E-Money gifts his friends luxury cars on his birthday

Nigerian entrepreneur, Emeka Okonkwo a.k.a E-Money who turned 40 today February 18 has gifted some of his friends with luxury cars. 

 

His brother and singer, Kcee who presented the cars to those it were meant for, noted that his brother's birthday is always symbolic with gifting of cars and other valuable items to worthy and deserving individuals.

 

He wrote; 

 

As you all know every 18th of February is my brother E-money’s Birthday which is symbolic with gifting of cars and other valuable items to worthy and deserving individuals.

This is year is not an exception as I am handing over the cars and other gifts to the beneficiaries on behalf of my brother who is presently not in town.

Happy Birthday to the best brother anyone could have, I pray for more of God’s blessings over you! @iam_emoney1 HBD to you again 

 

E-Money gifts his friends luxury cars on his birthdayE-Money gifts his friends luxury cars on his birthday


Breaking: Military aircraft crashes in Abuja (Video/Photos)

 

Breaking: Military aircraft crashes in Abuja (Video/Photos)

A military aircraft has crashed in Abuja. 


The aircraft, King Air 350 en-route to Minna crashed at Bassa Airport Village on Sunday morning, February 21, after reporting engine failure

Breaking: Military aircraft crashes in Abuja (Video/Photos)

Minister of Aviation, Hadi Sirika confirmed the crash in a tweet and said it "appears to be fatal”.

 

The Minister also urged Nigerians to be calm and wait for the outcome of an investigation by the military. 

Breaking: Military aircraft crashes in Abuja (Video/Photos)

He wrote: "A military aircraft King Air 350 has just crashed short of our Abuja runway after reporting engine failure enroute Minna. It appears to be fatal. We should remain calm & wait for the outcome of investigation by the military, while we pray for the departed soul/souls if any."

Breaking: Military aircraft crashes in Abuja (Video/Photos)


Video shared online shows firefighters battling the blaze from the crash scene. There are also unconfirmed reports that there is no survivor.

Video shows United Airlines plane engine on fire mid-flight as debris falls on houses in Colorado

 

 Video shows United Airlines plane engine on fire mid-flight as debris falls on houses in Colorado

A United Airlines flight was forced to return to Denver International Airport to make an emergency landing on Saturday afternoon, Febuary 20th, after the engine caught fire shortly after takeoff, sending aircraft debris on people's houses in Colorado. 

 

The Boeing 777 which had 241 people on board returned to the airport around 1:30 p.m. after suffering an engine issue. The flight had been bound for Honolulu.

 

The Federal Aviation Administration confirmed in a statement that the Boeing 777-200 safely returned to the Denver International Airport after "experiencing a right-engine failure shortly after takeoff."

 

"The FAA is aware of reports of debris in the vicinity of the airplane's flight path," the statement said.

 

The flight returned about 20 minutes after the police department in Broomfield, Colorado, said via Twitter that it had received reports that an airplane flying over the Denver suburb had engine trouble and had "dropped debris in several neighborhoods around 1:08 p.m."

 

 Video shows United Airlines plane engine on fire mid-flight as debris falls on houses in Colorado

 

No injuries were reported. 

 

Police said debris landed in Commons Park and the Northmoor and Red Leaf neighborhoods of Broomfield. 

 

Images from the scene showed large pieces of debris lying in the front yards of homes and a soccer field at the local park.

 

 Video shows United Airlines plane engine on fire mid-flight as debris falls on houses in Colorado

 

United Airlines told CNN there were 241 people, including 10 crew members, aboard Flight 328. All passengers were safely deplaned and transfered on a new flight.

 

"United Flight 328 experienced an engine failure and safely returned to Denver. We are in contact with the FAA, NTSB and local law enforcement," United Airlines said in a statement. "The NTSB is investigating and has directed that any persons with debris from this event contact their local law enforcement agency."

 

 Video shows United Airlines plane engine on fire mid-flight as debris falls on houses in Colorado

 

The union representing United pilots commended the crew of Flight 328 and said Saturday "there is no substitute for experience."

 

"We are thankful for the tremendous teamwork shown by the entire flight and cabin crew, and that there were no injuries on the ground or in the air," the United Master Executive Council of the Air Line Pilots Association, International told CNN in a statement.

 

According to air traffic control communications with Flight 328, the pilots were heard issuing a mayday call, telling air traffic controllers "we've experienced engine failure" as it caught fire. 

 

"NTSB has opened an investigation into the Feb. 20, 2021, engine event on a United 777. Denver-based NTSB investigators are responding," NTSB public affairs officer Peter Knudson said in a statement.