NBI arrests 2 Nigerians, 3 others for 'Mark Nagoyo' bank hacking | Inquirer News

NBI arrests 2 Nigerians, 3 others for ‘Mark Nagoyo’ bank hacking

/ 02:26 PM January 21, 2022

BDO NBI

MANILA, Philippines — Two Nigerians and three others were arrested by the National Bureau of Investigation (NBI) for allegedly being behind the “Mark Nagoyo” bank hacking that affected more than 700 clients of BDO Unibank.

The NBI on Friday said the five suspects were arrested in two different entrapment operations conducted by operatives of the NBI-Cybercrime Division in Pampanga.

ADVERTISEMENT

Nigerians Ifesinachi Fountain Anaekwe also known as “Daddy Champ,” and Chukwumeka Peter Nwadi were nabbed in Mabalacat, Pampanga on Tuesday.

FEATURED STORIES

The other suspects identified as Jherom Taupa, Ronelyn Panaligan, and Clay Revillosa were also arrested in Pampanga.

The NBI said Taupa was the alleged mastermind of the operation while Panaligan and Clay Revillosa were involved in the BDO hacking as web developers and downloaders.

According to the NBI, the suspects were involved in the BDO hacking last December where more than 700 of BDO’s clients lost funds in their accounts. The NBI said the suspects were able to access bank accounts and made the fund transfers while supposedly bypassing the One-Time-Pin requirement.

The email confirmations for the bulk of the illegal transfers showed that they were made by a certain “Mark D. Nagoyo.”

It also happened that the surname “nagoyo” could be loosely translated as “swindled” in Tagalog.

RELATED STORY

Disturbing breach

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TAGS: BDO, Mark Nagoyo

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.