A Ghanaian citizen pleaded guilty this week for his involvement in a vast network of scam that, according to the authorities, stripped victims in the United States of over $100 million through a combination of romantic fraud and attacks on companies. The defendant, Derrick Van Yeboah, admitted his responsibility for a conspiracy to commit electronic fraud and also agreed to pay more than $10 million in restitution, according to federal judicial documents.
The charges detail a structured and professional operation that worked from at least 2016 to May 2023. Van Yeboah was identified as a high-ranking member within this Ghana-based scheme, an organization that used both personal deception on dating platforms, as well as fraudulent suplication and mail techniques to induce bank transfers from companies and individuals. You can consult the official statement of the federal prosecutor in the South District of New York for more details in this link and review the indictment in published judicial documents.

The investigation describes two main forms of scam. On the one hand, so-called "romance scams" or romantic fraud, in which scammers cultivate an online emotional relationship with victims, almost always older who live alone, to gain their trust and then induce them to send them money or transfer funds to intermediate accounts in the United States. On the other hand, the operation carried out corporate mail engagement attacks (business email compromise), where criminals falsify mail addresses and supplanted customers or executives to instruct urgent and legitimate payments to network-controlled accounts.
What makes this case relevant from a technological and criminal perspective is the sophistication in the monetization chain. According to the prosecution, the organization in Ghana worked with accomplices in the United States who acted as "mules" or "middlemen": they received the funds, washed the money, kept one part and sent the rest to coordinators in West Africa - identified in the documents as "chairmen" - who led the fraud. This combination of social engineering, technical supplanting and laundering networks complicates the traceability of funds and increases damage to victims.
The authorities claim that Van Yeboah personally participated in many of the romantic fraud in the prosecution and that his conduct is linked to losses over $10 million for specific victims. He was extradited to the United States in August 2025 to face the process. The federal judge Arun Subramanian is scheduled to deliver a sentence on 3 June, and the law provides for sentences of up to 20 years & apos; imprisonment on these charges.
Beyond the particular impact of this case, the schemes described are part of a greater trend: online scams that mix personal deception techniques with methods that exploit administrative and technological vulnerabilities of companies. Organizations like the FBI have repeatedly warned about the risks of romantic fraud and corporate email engagement, and offer practical guides to recognize alarm signals and protect accounts and communications. To better understand these threats and how to prevent them, it is useful to review the FBI's resources on romantic scams and on the engagement of mail in corporate environments in the the FBI page on romance scams and your section on business email compromise.
If viewed from a technological perspective, these frauds are a reminder that safety is not just a matter of technical barriers: social engineering remains the most effective tool for violating systems. A well-built mail or a convincing profile in a dating application can cancel strong passwords or authentication systems if the victim trusts and acts under pressure. Therefore, effective protection combines technical controls - multifactor authentication, advanced mail filters, verification of payment instructions - with clear training and protocols in companies and education for end-users, especially older adults who are frequent targets.

At the judicial and operational level, this case also highlights the complexities of combating transnational networks. Inter-agency collaboration, international cooperation for extradition and criminal proceedings, and the identification of the first accounts that receive funds in various jurisdictions are essential elements for dismantling these chains. The existence of "mules" within the victim country itself complicates the response, because it extends the range of action of criminals and disperses the evidence by multiple financial institutions.
For the common person, the lesson is two-fold: to maintain a critical attitude in newly formed online relationships and to verify any request for money through independent and reliable channels. If an unexpected mail is received by requesting urgent transfers, it is prudent to confirm by phone with the person or company that allegedly sends it and to consult with the bank before authorizing movements. If anyone believes they have been victims, it is important to report them to the local authorities and, if they are in the United States, to go to the Internet Crime Complaints Centre (IC3) so that the corresponding response is recorded and activated.
Cases like Van Yeboah's are painful because they combine economic gain with emotional exploitation: victims not only lose money, but trust. Technology facilitates shields and detection, but prevention also depends on human consciousness. The ongoing criminal process provides an opportunity for the full structure of the operation to be reviewed and for assets to be recovered, to the extent possible, while society and companies must redouble efforts in education and controls to make these networks less effective.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...