The role of Nigerian romance scammers in the IRS data breach
The United States government accidentally gave $50 million to a group of criminals this year.
Hackers successfully filed thousands of fraudulent tax returns to the Internal Revenue Service (IRS), which issued refunds for at least 15,000 of those returns to about 5,000 bank accounts.
We’ve written at length about the data breach and described how most of the criminal operation worked. We know the hackers used a large set of personal data, stolen from elsewhere, to log into the IRS website and download previously filed returns. We know they used those tax transcripts to create and file new returns that would generate refunds.
But one crucial part of the scam remained a mystery: How did the crooks manage to open 5,000 bank accounts in the US? And once the refunds were issued to those accounts, how did they get the money out?
It turns out there is a well-established criminal network in the US that specializes in maintaining multitudes of bank accounts, developing money mules, and funneling funds out of the country: Nigerian romance scammers.
The work of a romance scammer is not all that complicated. They spam as many people as possible over email or social media. The scammer tells the recipient that he happened upon her name or profile picture by chance. He says, I used to know someone with your name. He says, I saw your face and was instantly mesmerized. Later on, he starts asking for money. The response rate doesn’t have to be very high; one lonely, vulnerable mark can lead to thousands of dollars.
Those victims can also be used to move cash. An online lover sends a large deposit to her victim’s bank account, and asks him to transfer that money to Nigeria via Western Union. It’s for a business deal, she says. Or it’s for family, or it’s going into an offshore account. And just like that, a victim becomes an accomplice.
Here is what all of this has to do with the IRS data breach: In our previous story, we detailed the case of Michael Kasper, one of the victims of the breach. After he learned that the government had issued a refund for a fake tax return filed under his name, Kasper tracked down the bank where the refund was sent. It was located in Williamsport, a city of about 30,000 people in central Pennsylvania. The person who owned the account, 21-year-old Isha Sesay, was quickly identified and arrested.
Sesay told the police that she’d been hired on Craigslist to open a bank account, receive deposits–and wire the bulk of the money to Nigeria. Sesay’s account received just one other deposit, aside from the IRS refund: $5,400 from a man in South Dakota. Sesay’s arresting officer contacted the man, according to her arrest warrant, and found out why he sent the money:
[The victim] stated that he believes that he had fallen victim to some sort of internet money scam. He stated that he met a person online who identified theirself [sic] as Pamela Venes. [The victim] stated that he had never met Venes, but they had become close through communicating over the internet over a period of time.
Venes eventually began requesting money from the man, the arrest warrant said, claiming that she needed to pay some medical bills. According to the FBI, this is a common ploy in the world of internet cons: The scammers say they need money for travel documents, or say they’ve been a victim of a crime, or that they were in an accident and now have to pay exorbitant hospital bills.
So how did money from a romance scam and a large government data breach both end up in Sesay’s bank account? It’s certainly possible that she was the person who had posed as Pamela Venes online, tricking the South Dakota man into depositing $5,400 into a bank account. But Sesay opened that account under her own name, and it’s unlikely that a criminal who would make such an obvious mistake was involved in a complex operation like the IRS breach. Her arresting officer, Donald Mayes, said as much in an interview with Quartz.
Many of the details surrounding Sesay’s case are typical in romance scams. Last month, for example, a federal grand jury indicted nine individuals for defrauding 17 men and women they met on dating sites like Match.com and OKCupid. These alleged scammers also made claims of urgent hospital bills, according to the indictment, as well as “fake plane trips to visit the victims, fake problems with overseas businesses, and fake foreign taxes.” The indictment describes a vast web of transactions between the conspirators and victims to and from many bank accounts in Maryland and Virginia—and one in Nigeria.
There’s also the case of Elaine Elrod, whose story was told in detail byBrendan I. Koerner in Wired earlier this month. After falling in love with a man she met on Facebook, but had yet to meet in person, Elrod started receiving the typical requests for money. The man’s son had been in a car accident, he said. The hospital bills were piling up and he needed help. Elrod ended up sending the man every dime she had. And once her money was gone, the man began arranging for deposits to be made to her bank account, and asked her to wire those funds to Nigeria. Suddenly, Elrod was a money mule.
In another case, this one in 2012, a Georgia man was convicted of an array of crimes that included not only romance scams, but identity theft and hacking as well. After stealing login credentials to a payroll company’s computer systems and extracting money, the man and his accomplices used victims of romance scams to funnel the money to Nigeria. According to an FBI press release: “As part of the scheme, more than $300,000 in fraudulent payroll was wired to defendant Olaniyi Jones, a Nigerian national who impersonated a European woman interested in romantic relationships to dupe mules into wiring the proceeds of the scheme overseas.”
So where does all of this leave us? What we know is that the criminals who defrauded the IRS needed to have about 5,000 bank accounts ready to receive the incoming tax refunds. We know that one of those bank accounts also received a deposit from what appears to be a pretty typical internet romance scam. And we know that Isha Sesay told the police that she wired most of the money from both deposits to Nigeria, but she did not have any documentation to prove that. We also don’t have any proof that she was, as she said, hired on Craigslist to mule the money, and we don’t know why she used her real name to open the account.
As of August, the IRS had not followed up with the Williamsport police to inquire further about Sesay’s case. The agency has not yet released any details about the provenance of the data breach, and had no comment about the potential involvement of Nigerian romance scammers. The office of Rep. Peter Roskam, who previously told CNNthat the attack originated in Russia, did not respond to emails asking whether he still believed that to be the case.
If it turns out that romance scammers did play a role in the IRS data breach, the next question will be how extensive that role was. Previous cases, like the one in Georgia, demonstrate that these groups have pulled off heists that utilize similar skill sets. It’s also worth considering that their network of bank accounts and mules could be farmed out to other criminal operations.
The IRS, meanwhile, says it is still investigating the breach.
Click here to read the Quartz Africa report.