Nigeria's Major Crypto Romance Scam Bust: 792 Arrested in International Fraud Operation

Nigeria's EFCC arrests 792 suspects in a major crypto romance scam bust, targeting victims in North America and Europe. The operation reveals the scale of international fraud and the need for vigilance.

In a significant crackdown on international fraud, Nigeria's Economic and Financial Crimes Commission (EFCC) has arrested 792 individuals linked to a large-scale crypto romance scam. The operation, which took place on December 10, 2024, targeted victims primarily in North America and Europe, exploiting online relationships to defraud them of their money.

Key Takeaways

  • 792 Arrested: The EFCC apprehended 792 suspects, including 148 Chinese and 40 Filipino nationals.
  • Location: The arrests occurred at the Big Leaf Building in Lagos, a hub for fraudulent activities.
  • Modus Operandi: Scammers used social media to build trust with victims before soliciting investments in fake cryptocurrency schemes.
  • International Collaboration: The EFCC is working with global partners to investigate links to organized crime.

Overview of the Operation

The EFCC's operation was the result of extensive intelligence gathering and surveillance. The suspects were found operating from a luxury seven-story building in Lagos, which served as a call center for the scam. The building was equipped with high-end computers and technology to facilitate the fraudulent activities.

Wilson Uwujaren, the EFCC spokesperson, revealed that the scammers targeted individuals in the United States, Canada, and various European countries. They would create fake profiles on social media platforms like WhatsApp and Instagram, luring victims into romantic relationships or enticing them with seemingly lucrative investment opportunities.

The Scam Explained

The scheme, often referred to as a "pig butchering" scam, involves the following steps:

  1. Building Trust: Scammers establish a relationship with victims, often posing as attractive individuals seeking romance.
  2. Investment Pressure: Once trust is gained, victims are pressured to invest in fake cryptocurrency platforms controlled by the scammers.
  3. Disappearance: After the victims invest significant amounts of money, the scammers vanish, leaving the victims with substantial financial losses.

Evidence and Seizures

During the raid, the EFCC seized a variety of evidence, including:

  • Computers and Phones: Essential tools used in the fraudulent operations.
  • Vehicles: Likely acquired through the proceeds of the scams.
  • SIM Cards: Over 500 local SIM cards were recovered, indicating the scale of the operation.

Implications and Future Actions

The EFCC's chairman, Ola Olukoyede, emphasized that this operation challenges the stereotype that fraud is predominantly a Nigerian issue. He stated that foreign criminals often exploit Nigeria's reputation to conduct their illegal activities.

The EFCC is committed to collaborating with international law enforcement agencies to trace the connections of these fraudsters to organized crime networks. The agency aims to ensure that criminals have no safe haven in Nigeria.

Conclusion

This major bust highlights the ongoing battle against online fraud and the importance of vigilance among internet users. As scammers continually adapt their strategies, awareness and education are crucial in preventing future victimization. The EFCC's actions serve as a reminder that international cooperation is essential in combating cybercrime effectively.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

IOC Matching On-Chain: Indicators and Hits
29.12.2025
[ Featured ]

IOC Matching On-Chain: Indicators and Hits

Explore ioc matching on chain techniques to identify and analyze on-chain indicators of compromise for enhanced cybersecurity. Learn about risk scoring and best practices.
Read article
Threat Intel API for Crypto: Endpoints and IOCs
29.12.2025
[ Featured ]

Threat Intel API for Crypto: Endpoints and IOCs

Explore crypto threat intel API endpoints and IOCs. Understand crypto threat intelligence, key components, and advanced features for defense.
Read article
Risk Rule Engine for Web3: Build and Tune
27.12.2025
[ Featured ]

Risk Rule Engine for Web3: Build and Tune

Build and tune a Web3 risk rule engine. Understand the Web3 risk landscape, core components, and AI integration for robust security.
Read article