Understand Your Rights. Solve Your Legal Problems

Ex-Goldman Sachs Analyst Fined £587,000 for Insider Trading.

A former analyst at Goldman Sachs has been ordered by a London court to pay £587,000 following his conviction for insider dealing and fraud. Mohammed Zina, who was found guilty last year and sentenced to 22 months in prison, must pay the amount based on the assets currently available to him.

On Wednesday, Southwark Crown Court issued the confiscation order, which totals £586,711 (€701,932), as confirmed by both the court and the Financial Conduct Authority (FCA), which brought the prosecution.

The court determined that Zina had benefited by £1.1 million from his illegal activities, which included insider trading and fraudulently obtaining loans from Tesco Bank. Zina was instructed to pay the confiscated amount from his present assets.

Related: Ex-Goldman Sachs Manager Claims £3.8M In Paternity Sex Bias Case

The 36-year-old was prosecuted alongside his brother, Suhail Zina, a former lawyer at the prestigious UK law firm Clifford Chance, in one of the FCA's most prominent insider trading cases in recent years. A jury unanimously found Mohammed Zina guilty on all nine counts of insider dealing and fraud. Suhail Zina was acquitted before the trial concluded after the FCA withdrew the fraud charges against him and the court ruled there was no case to answer.

The trial revealed that Zina made approximately £140,000 in profits from trading stocks, including those of semiconductor company Arm and pub chain Punch Taverns. His largest gain was a £55,000 profit from trading in US food firm Snyder’s-Lance. “I cannot help but feel pity for you, because you have thrown away what was undoubtedly a promising career in banking,” remarked Judge Tony Baumgartner at Zina’s sentencing in February last year. “Your reputation now is lost, and it is likely you will never be trusted to work in a position of such responsibility again.”

This case marked the FCA’s first insider dealing conviction in five years, following a period of inactivity partly caused by the Covid-19 pandemic and backlogs in the court system. However, the number of insider dealing cases has risen recently, with several now being heard in court.

Zina has been given three months to pay the confiscation amount. Failure to comply will result in a default prison sentence of five years.

“Insider dealing harms the integrity of our markets. As well as prosecuting insider dealers, we will not allow them to keep any part of their illicit profits,” said Therese Chambers, the FCA’s joint executive director of enforcement and market oversight, in a statement on Friday.

A representative for Zina has yet to respond to requests for comment.

Declan Murphy, 35, sentenced to 27 months for stealing gym members' locker pins and hacking their bank accounts.

A man from Bromley, England, has been sentenced to 27 months in jail for using gym members’ locker codes to access their bank accounts. Declan Murphy, 35, pleaded guilty to three counts of theft and 11 counts of fraud by false representation on January 17, 2025. He was also given a “Criminal Behaviour Order” that bans him from entering certain gyms nationwide.

stealing bank info 011925 01 f75c6a78f8884458b9b3ba30ecc3f751

Declan Murphy. Photo: City of London Police/X

Murphy’s scheme came to light after he used a series of false membership cards to access multiple gym chains in London. The incident that led to his arrest occurred on September 13, 2024, when he was in a gym between 8:10 and 9:25 a.m. Murphy observed a fellow gym member entering their locker pin, which was a four-digit code. The man did not realise that Murphy was watching as he entered the code.

Using the information, Murphy later gained access to the victim’s locker and stole both the victim’s bank cards and his phone. The phone was damaged beyond use, likely to prevent the victim from monitoring his bank transactions and immediately contacting his financial institutions. The damage to the phone provided Murphy with a window of opportunity to withdraw £500 from an ATM and attempt a purchase worth £5,400 at an Apple Store. The transaction was declined, but the theft and fraud were successful in part.

Murphy had committed similar offences earlier that year, with the September incident taking place while he was out on bail. Authorities also revealed that Murphy had been using gym membership cards under false names to access a variety of gyms, enabling him to target unsuspecting members.

The judge overseeing Murphy’s sentencing, Edward Connell, labelled the crimes “pre-planned” and “well-practised.” Detective Chief Inspector Kevin Ines from the City of London Police issued a warning to gym-goers about the need for caution when using locker codes. He urged people not to use the same pin for their gym lockers, phones, and bank cards, as it can provide criminals like Murphy with an easy way to exploit vulnerabilities.

“This case is a reminder that gym-goers should take care when entering their pin codes and ensure that they don’t reuse the same pin across multiple services,” said Ines. He continued, “People expect their belongings to be safe in their lockers, but unfortunately, this method of crime is becoming more common.”

As part of his sentence, Murphy has been banned from several health and fitness centres across the UK. His conviction highlights the increasing threat of personal security breaches in places where people typically feel their property is secure, such as gyms.

CFPB Sues JPMorgan, Bank of America, Wells Fargo Over Zelle Fraud.

The Consumer Financial Protection Bureau (CFPB) sued the operator of Zelle and three of the nation’s largest banks for failing to protect consumers from widespread fraud on America’s most widely available peer-to-peer payment network.

Early Warning Services, which operates Zelle, along with three of its owner banks—Bank of America, JPMorgan Chase, and Wells Fargo—rushed the network to market to compete against growing payment apps such as Venmo and CashApp, without implementing effective consumer safeguards. Customers of the three banks named in today’s lawsuit have lost over $870 million over the network’s seven-year existence due to these failures.

The CFPB’s lawsuit describes how hundreds of thousands of consumers filed fraud complaints and were largely denied assistance, with some being told to contact the fraudsters directly to recover their money. Bank of America, JPMorgan Chase, and Wells Fargo also allegedly failed to properly investigate complaints or provide consumers with legally required reimbursement for fraud and errors. The CFPB is seeking to stop the alleged unlawful practices, secure compensation and penalties, and obtain other relief.

“The nation’s largest banks felt threatened by competing payment apps, so they rushed to launch Zelle,” said CFPB Director Rohit Chopra. “By failing to put in place proper safeguards, Zelle became a target for fraudsters, leaving victims to fend for themselves.”

Bank of America, N.A. is a national bank and subsidiary of the Bank of America Corporation, headquartered in Charlotte, North Carolina. As of June 30, 2024, Bank of America had over $2.5 trillion in consolidated total assets.

JPMorgan Chase Bank, N.A. is a national bank and subsidiary of JPMorgan Chase & Company headquartered in Columbus, Ohio, and the nation’s largest bank, with over $3.5 trillion in consolidated total assets as of June 30, 2024.

Wells Fargo Bank, N.A. is a national bank and subsidiary of Wells Fargo & Company headquartered in Sioux Falls, South Dakota. As of June 30, 2024, Wells Fargo had $1.9 trillion in consolidated total assets.

Early Warning Services, LLC is a financial technology and consumer reporting company based in Scottsdale, Arizona. Early Warning Services designed and operates the Zelle network. It is co-owned by seven of the largest banks in the United States: Bank of America, Capital One, JPMorgan Chase, PNC Bank, Truist, U.S. Bank, and Wells Fargo.

Zelle allows near-instant electronic money transfers through linked email addresses or U.S.-based mobile phone numbers, known as “tokens.” Users can create multiple tokens across different banks and quickly reassign them between institutions, a feature that has left consumers vulnerable to fraud schemes.

The CFPB alleges widespread consumer losses since Zelle’s 2017 launch due to the platform’s and the defendant banks’ failure to implement appropriate fraud prevention and detection safeguards. The CFPB alleges that Bank of America, JPMorgan Chase, Wells Fargo, and Early Warning Services violated federal law through critical failures including:

Leaving the door open to scammers: Zelle’s limited identity verification methods have allowed fraudsters to quickly create accounts and target Zelle users. For example, criminals often exploited Zelle’s design and features to link a victim’s token to the fraudster’s deposit account, which caused payments intended for the consumer’s account to instead flow to the fraudster account. Allowing repeat offenders to hop between banks: Early Warning Services and the defendant banks were too slow to restrict and track criminals as they exploited multiple accounts across the network.

Banks did not share information about known fraudulent transactions with other banks on the network. As a result, bad actors could carry out repeated fraud schemes across multiple institutions before being detected, if they were detected at all. Ignoring red flags that could prevent fraud: Despite receiving hundreds of thousands of fraud complaints, the defendant banks have failed to use this information to prevent further fraud.

They also allegedly violated the Zelle Network’s own rules by not reporting fraud incidents consistently or on time. Abandoning consumers after fraud occurred: Despite obligations under the Electronic Fund Transfer Act and Regulation E, the defendant banks failed to properly investigate Zelle customer complaints and take appropriate action for certain types of fraud and errors. Enforcement Action Under the Consumer Financial Protection Act, the CFPB has the authority to take action against institutions violating consumer financial protection laws, including engaging in unfair, deceptive, or abusive acts and practices.

The CFPB’s lawsuit seeks to halt unlawful conduct, obtain restitution for harmed consumers, and obtain a civil money penalty, which would be paid into the CFPB’s victims relief fund, and secure other appropriate relief.

Proliferation of Scams The holiday season in particular can bring a surge of scams. Learn more about common types of scams from the CFPB’s online resources. Consumers can submit complaints about financial products and services, including scams on payment networks, by visiting the CFPB’s website or by calling (855) 411-CFPB (2372).

Employees who believe their company has violated federal consumer financial protection laws are encouraged to send information about what they know to whistleblower@cfpb.gov. To learn more about reporting potential industry misconduct, visit the CFPB’s website.

Latest Articles:

  1. Alec Baldwin's Involuntary Manslaughter Charges Dismissed

  2. CFPB sues Walmart and Branch Messenger

  3. DraftKings Faces Allegations of Account Closures and Retention of Funds

  4. Starbucks Widely Violated Law in Washington, Labor Judge Finds

  5. Teacher who raped student, 12, and got pregnant sentenced to 25 years

Gen Digital Inc. Pays $55.1 Million Settlement After False Claims Act Violation.

Gen Digital Inc., formerly known as Symantec Corp., based in Tempe, Arizona, has agreed to a significant settlement of $55.1 million, concluding a decade-long legal battle under the False Claims Act. The settlement follows a four-week bench trial and includes $16.1 million in damages and $36.8 million in civil penalties, in addition to post-judgment interest and other associated costs.

The lawsuit centered on allegations that Symantec knowingly misrepresented its commercial pricing during the negotiation of a General Services Administration (GSA) contract. These misleading practices, spanning from 2006 to 2012, caused the GSA to accept and pay inflated prices for Symantec's products and services. The company’s failure to disclose accurate pricing information and their repeated breach of the Price Reduction Clause, which mandates GSA contractors to maintain competitive pricing, led to the government being overcharged.

“The department will hold accountable contractors that knowingly overcharge the United States to enrich themselves,” said Brian M. Boynton, Principal Deputy Assistant Attorney General of the Civil Division. “The years spent litigating this case and taking it to trial demonstrate the department’s steadfast commitment to protecting taxpayer funds.”

The case, titled United States ex rel. Morsell v. Symantec Corp., was filed under the qui tam provision of the False Claims Act. This provision allows whistleblowers to file lawsuits on behalf of the government and receive a portion of the recovery. The case was initiated by Lori Morsell, a former employee of Symantec, who managed the relevant contract. While her share from the settlement has not been finalized, her whistleblower actions played a pivotal role in bringing the fraudulent claims to light.

Matthew M. Graves, U.S. Attorney for the District of Columbia, emphasized that this case sends a strong message to contractors who attempt to defraud the government. "“The trial team secured a $55 million judgment that holds accountable a contractor who intentionally tried to overbill the government. Because these schemes steal taxpayer dollars, the United States Attorney’s Office for the District of Columbia will be steadfast in its efforts to bring fraudsters to justice no matter the complexity of the matter, pursuing them through trial, if necessary, to secure a just outcome.” Mr. Graves said.

The False Claims Act (FCA) is a U.S. federal law that targets fraud against the government. It allows the government to sue individuals or entities that submit fraudulent claims for payment. The FCA’s key feature is its qui tam provision, which lets private citizens, or whistleblowers, file lawsuits on behalf of the government and receive a share of any recovery.

The law holds violators accountable by imposing hefty fines and requiring repayment of three times the amount lost due to fraud. It also protects whistleblowers from retaliation, offering remedies like reinstatement and back pay. The FCA has been crucial in combating fraud in sectors like healthcare, defense, and contracting. Initially passed during the Civil War, it now plays a vital role in safeguarding taxpayer funds.

Gen Digital Inc., previously known as Symantec Corporation, is a global cybersecurity company based in Tempe, Arizona. The company provides a wide range of security solutions and services to protect businesses and individuals from cyber threats. Gen Digital specializes in areas such as data security, network protection, cloud security, and identity protection, aiming to safeguard digital environments from evolving threats.

Symantec, the company's former name, was founded in 1982 and became one of the most recognized brands in cybersecurity. However, in 2019, Symantec announced a strategic shift, selling its enterprise security business to Broadcom and focusing on consumer-oriented products. In 2021, the company officially rebranded to Gen Digital, reflecting its evolution and broadening its product offerings beyond just cybersecurity.

Gen Digital operates with a portfolio of trusted security brands, including Norton, LifeLock, and Avast, and continues to develop tools for digital privacy and security protection. The company serves millions of consumers globally, helping them manage their online safety and privacy.

 

Stoli Group USA Files for Bankruptcy Amid Financial Struggles and Cyberattack

 

Florida Man Arrested for Impersonating Elon Musk in $250,000 Fraud Scheme.

A Florida man has been arrested for impersonating tech billionaire Elon Musk in an attempt to defraud a 74-year-old woman out of at least $250,000, according to law enforcement officials. Jeffrey Arthur Moynihan Jr., 56, was taken into custody in Bradenton on Tuesday evening and is facing charges of grand theft.

Moynihan allegedly posed as the CEO of Tesla and SpaceX, building a friendship with the victim, a woman from Texas, through Facebook starting in 2023. As part of the scam, the victim was promised an extraordinary return on investment of $55 million.

According to investigators, the victim’s husband revealed that she had been duped into relinquishing nearly $600,000 in total, with $250,000 of that amount traced to accounts linked to Moynihan. The victim was convinced she had invested her money directly with Elon Musk and felt a strong personal connection with him.

Detective Jim Curulla of the Bradenton police received a lead from authorities in Frisco, Texas, who were probing an incident involving a woman who purportedly donated a significant amount of money to an organization impersonating a tech billionaire, as stated by a department spokesperson.

The scam began when the fake Musk gained the victim’s trust, suggesting she invest in his businesses. Over time, the victim made several financial transactions, believing she was supporting Musk’s ventures. To strengthen his ruse, Moynihan would frequently update the victim with fabricated details about Musk’s daily activities, often referencing recent news articles to make the interactions feel more personal.

The investigation began after Texas authorities uncovered a similar case, with a woman donating a large sum of money to a fake Musk organization. Through further investigation, authorities discovered that Moynihan had received the victim’s $250,000 through his business, Jeff’s Painting and Pressure Washing LLC. Additionally, records revealed other funds from the victim were deposited into accounts tied to Moynihan.

During his arrest, Moynihan was found shirtless at his residence, where he questioned the charges of grand theft, asking, "Grand theft of what?" Officers informed him that a detective would provide further details. Moynihan later claimed that the $250,000 was meant for a girlfriend with whom he had an online-only relationship, raising the possibility of him being involved in a separate fraudulent scheme.

 

Trafigura Seeks to Recover $500 Million in Mongolian Fuel Fraud Scheme

 

Former Santa Cruz County Treasurer Pleads Guilty to Embezzling $38 Million and Tax Evasion.

A former official from Santa Cruz County, Arizona, has pleaded guilty to multiple criminal charges, including embezzlement, money laundering, and tax evasion, after misappropriating over $38 million in county funds from 2014 to 2024.

Elizabeth Gutfahr, 62, who served as the County Treasurer for over a decade, is accused of diverting these funds for personal gain, leading to significant losses for the county and tax violations exceeding $13 million.

Embezzlement Scheme and Misappropriated Funds

Court documents reveal a detailed picture of Gutfahr's illegal activities during her tenure as County Treasurer from 2012 to 2024. Gutfahr orchestrated a complex scheme that involved transferring county funds into business accounts she had set up for the sole purpose of funneling the money into her personal finances.

From these fraudulent accounts, she diverted the funds into her personal accounts, where she used the money for various personal expenditures, including purchasing real estate, acquiring at least 20 vehicles, covering costs for her family ranch, and managing her cattle business.

“Elizabeth Gutfahr stole $38 million from the people of Santa Cruz County, Arizona, during the 12 years she served as their County Treasurer,” stated Nicole M. Argentieri, Principal Deputy Assistant Attorney General for the Justice Department’s Criminal Division. “We expect public officials to serve as stewards of the government fisc — not to loot it. Today’s plea demonstrates yet again that the Justice Department remains committed to rooting out public corruption at all levels of government.”

Circumventing Safeguards to Carry Out Her Scheme

To carry out the embezzlement, Gutfahr utilized a series of wire transfers—187 in total—by circumventing the two-step approval process required for such transfers. She accomplished this by exploiting the access of a subordinate employee's token, allowing her to initiate and authorize the wire transfers herself.

In addition, Gutfahr falsified numerous financial documents, including accounting records, cash reconciliation statements, and reports on the county’s investment accounts, to hide her illegal activities and obscure the trail of misappropriated funds.

Moreover, Gutfahr neglected to report the stolen funds as income, committing tax evasion on more than $13 million in unreported earnings.

Authorities Commit to Holding Public Officials Accountable

The case has drawn strong reactions from law enforcement and legal authorities, who emphasize the importance of accountability for public officials. U.S. Attorney Gary Restaino for the District of Arizona stated, “Local property taxes fund our communities, enrich our schools, and shape our futures."

The FBI and IRS Criminal Investigation (IRS-CI) have been key players in bringing the case to light. Special Agent in Charge Carissa Messick of the IRS Criminal Investigation Phoenix Field Office remarked, “We cannot overemphasize our dedication to rooting out public corruption from our communities. I am proud of the dedicated work IRS-CI special agents put into investigating this case alongside our fellow law enforcement agencies. Through her embezzlement scheme, Elizabeth Gutfahr stole from the very constituents who elected her. Let this guilty plea serve as a reminder to all who are tempted to use their positions of power to enrich themselves at the cost of the American people: IRS-CI special agents are experts at following the money, and we will continue to investigate allegations of fraud at all levels.”

Elizabeth Gutfahr is set to be sentenced on February 6, 2025. She faces a maximum sentence of 10 years for embezzlement, 20 years for money laundering, and five years for tax evasion.

Additionally, she is expected to make restitution to Santa Cruz County or other identified victims for the total amount of stolen funds. A federal district court judge will determine the final sentence based on the U.S. Sentencing Guidelines and other relevant considerations.

Connecticut Investor Pleads Not Guilty to Embezzling $3.5 Million in Hedge Fund Scheme

 

Energy Executive Francesco Mazzagatti Faces Legal Action Over Alleged €143.8 Million Misappropriation in RockRose Acquisition.

Francesco Mazzagatti, CEO and majority owner of Viaro Energy, is at the center of a major legal dispute after being accused of misappropriating at least €143.8 million from a Singaporean trading firm, Alliance Petrochemical & Investment (API). The lawsuit, filed in London, also links Mazzagatti to financial misdeeds involving an Iranian petrochemical company, Mehr Petrochemical Co. (MHPC), which was under U.S. sanctions.

 

Legal Claims and Allegations

API claims that Mazzagatti, who was the CEO of the firm until 2020, faked bank statements, forged board documents, and misdirected payments meant for MHPC to his control. API alleges that he used the misappropriated funds to acquire a majority share in RockRose Energy, a UK-based energy company Viaro Energy purchased for £247 million in 2020.

The lawsuit states that Mazzagatti secretly opened accounts in the UAE and Singapore, through which customers paid for petrochemical products from MHPC. It also claims he used falsified financial documents to cover up the fraud, including a fake bank statement presented to the API board in 2021 showing a balance of nearly €25.8 million. The total amount misappropriated, according to API, is calculated to be €143.8 million, which was owed to MHPC by API.

RockRose Energy Acquisition

The lawsuit further suggests that Mazzagatti may have used the stolen funds to support Viaro Energy’s £247 million acquisition of RockRose Energy, a transaction that raised concerns within the industry. Viaro reportedly secured a £250 million loan guarantee from Sheikh Zayed bin Surror bin Mohammed Al Nahyan of the Abu Dhabi royal family to facilitate the deal. This, according to the lawsuit, was intended to quiet objections from Taqa, Abu Dhabi’s state-owned electricity company, which was concerned that RockRose's cash would be used to pay for the acquisition, leaving the company unable to meet future liabilities, including decommissioning costs for its joint ventures.

The Legal Backdrop

Viaro Energy, under Mazzagatti’s leadership, became a significant player in the UK energy market after the acquisition of RockRose. However, the RockRose deal and the alleged financial misappropriation have sparked multiple legal battles.

API is accusing Mazzagatti of using fraudulent means to acquire his stake in RockRose Energy, including the use of misappropriated funds. Taqa has separately filed a lawsuit against Mazzagatti and Viaro, alleging financial misconduct related to the sale of an oilfield and the payment of an $84 million dividend prior to the deal.

Mazzagatti and his CFO, Francesco Dixit Dominus, deny all allegations of wrongdoing. They argue that the lawsuit is a vendetta orchestrated by Arshiya Jahanpour, a former business associate, who allegedly controlled API after 2018 and orchestrated the transfer of funds. They claim that the bank accounts involved in the alleged fraud were opened under Jahanpour’s direction and that Mazzagatti was not involved in their operation.

Response and Defenses

Mazzagatti and Dixit Dominus's legal team asserts that API's claims are unfounded and that the financial transfers in question were legitimate. They further argue that Jahanpour, not Mazzagatti, was the real operator of API, and that the funds in question were procured by Jahanpour. According to the defense, the allegations against Mazzagatti and Dixit Dominus are part of an effort to wrongly assign liability for actions they did not commit.

U.S. Sanctions and Impact on MHPC

Mehr Petrochemical Co., a key player in the dispute, was placed under U.S. sanctions in 2023, prohibiting American entities from doing business with the company. The U.S. Treasury Department has stated that Mehr was involved in facilitating transactions for the Iranian government. The legal ramifications of these sanctions may impact the ongoing litigation and any potential liabilities Mazzagatti could face from the broader international financial community.

 

Latest: Sotheby’s Settles $6.25 Million Lawsuit with New York Attorney General Letitia James Over Tax Fraud Allegations

 

California Residents Sue Ubisoft Over "The Crew" Shutdown, Claim Fraud and Misrepresentation.

Two residents of California have filed a legal complaint against Ubisoft, alleging fraud and unfair business practices after the company shut down the servers for The Crew, a popular online-exclusive racing game.

 

The lawsuit, filed in a California court, claims that Ubisoft misled consumers into believing they had purchased a full, functional copy of the game that would remain playable in offline mode—even after the servers were shut down.

The plaintiffs, who purchased The Crew in 2018 and 2020, argue that Ubisoft’s packaging and advertising falsely represented that the game was entirely encoded onto physical discs and that an offline version would always be accessible. According to the lawsuit, Ubisoft’s failure to clearly disclose that The Crew was primarily an online-only game violated California’s Unfair Competition Law and resulted in fraud and misrepresentation.

The suit, which aims to become a class action, highlights several legal grievances, including:

  • Violation of the Consumer Legal Remedies Act
  • Violation of California’s Unfair Competition Law
  • Violation of California’s False Advertising Law
  • Fraud
  • Fraudulent Inducement and Misrepresentation
  • Breach of Express and Implied Warranty

Ubisoft’s Shutdown of The Crew: A Breach of Consumer Trust?

The plaintiffs contend that Ubisoft’s decision to shut down the servers for The Crew without providing an offline version, unlike some of the company’s other games such as Assassin’s Creed 2 and 3, was both deceptive and unfair. Ubisoft had previously promised offline versions for The Crew 2 and The Crew Motorfest but did not extend this to the original The Crew. This has left players unable to access even the single-player portion of the game they had purchased.

The lawsuit also includes an analogy comparing Ubisoft’s actions to a pinball machine manufacturer entering someone’s home and removing key parts of the machine, rendering it unplayable. While the analogy may seem exaggerated, it underscores the plaintiffs’ argument that they were misled into thinking they were buying a complete product—one that could be played at any time—only to find it essentially rendered useless after the servers were shut down.

The Legal Battle Could Have Major Consequences for Ubisoft

While the lawsuit currently involves just two plaintiffs, their legal team is seeking class action status, which would allow other affected players to join the case. If successful, the class action could result in significant financial consequences for Ubisoft, including the potential for refunds and damages. The plaintiffs are demanding that Ubisoft return the full premium price paid for the game and cover legal expenses. Furthermore, they are asking the court to force Ubisoft to “disgorge all revenues obtained” from their alleged violations of California law.

The lawsuit has already garnered attention within the gaming community, as The Crew was a beloved title for many players. The plaintiffs also note the dissatisfaction voiced by other fans of the game on social media, with some users questioning why Ubisoft did not provide a proper offline mode for the original title.

Ubisoft’s Response and Legal Challenges

As of now, Ubisoft has yet to respond to the lawsuit in detail, but the case presents a major challenge for the publisher. The suit claims that Ubisoft failed to live up to industry standards when it came to communicating the nature of the game, potentially opening the door for a more significant legal battle.

In summary, the lawsuit against Ubisoft seeks not only a refund for the plaintiffs but also aims to hold the company accountable for misleading customers and failing to deliver a product that could be used as promised. If the case becomes a class action, it could have far-reaching implications for the gaming industry and the way online-exclusive games are marketed and sold.

 

Related: Ubisoft Sued: Class Action Over Alleged Customer Data Sharing with Meta

 

 

British-Nigerian Sentenced to 7 Years for $5M Business Email Scam.

Oludayo Adeagbo, a British-Nigerian national also known as John Edwards and John Dayo, has been sentenced to seven years in prison for his role in orchestrating a multimillion-dollar business email compromise (BEC) scheme. The fraud, which resulted in losses exceeding $5 million, involved a complex cyber-enabled financial scam targeting institutions and businesses across the United States.

Oludayo Adeagbo, along with his accomplices Donald Echeazu and Olabanji Egbinola, used sophisticated techniques to impersonate reputable companies, particularly in high-value construction projects, to deceive organizations into transferring substantial sums of money to fraudulent accounts. The trio was extradited from the United Kingdom in August 2022 to face charges of conspiracy, wire fraud, and money laundering. Their criminal activities spanned multiple states, including North Carolina, Texas, and Virginia.

The Scheme: A $5 Million Fraud Operation

The BEC scheme primarily targeted educational institutions and construction projects, with the most notable fraud occurring at a university in North Carolina. Court documents reveal that Oludayo Adeagbo and his team registered a domain name nearly identical to that of the legitimate construction company overseeing the university project. They then created a fraudulent email account designed to resemble a company employee's address, which was used to trick university officials into transferring $1.9 million into a bank account controlled by the criminals.

The fraudulent operation did not stop there. Oludayo Adeagbo and his co-conspirators extended their tactics to Texas, where they targeted local government agencies and educational institutions, impersonating construction firms to siphon off an additional $3 million. In total, their criminal activities accumulated over $5 million in stolen funds.

Guilty Plea and Sentencing

On April 8, 2024, Oludayo Adeagbo pleaded guilty to the charges of conspiracy, wire fraud, and money laundering related to the frauds in both North Carolina and Texas. In addition to his seven-year prison sentence, Adeagbo was ordered to pay restitution in the amount of $942,655.03, compensating victims of the fraud scheme.

The U.S. Department of Justice highlighted that this case is part of a broader effort to combat the growing threat of business email compromise and other cyber-enabled financial crimes. BEC scams have become increasingly prevalent, with perpetrators exploiting technology and social engineering tactics to steal millions from businesses, government agencies, and educational institutions.

A Growing Threat of Business Email Compromise

Business Email Compromise (BEC) is a growing form of cybercrime where criminals impersonate trusted entities, such as contractors, vendors, or executives, to deceive companies into making fraudulent wire transfers. These schemes typically involve the creation of counterfeit email addresses and domain names that closely resemble those of legitimate businesses. The criminals then use these fraudulent communications to manipulate victims into transferring money to accounts they control. As the digital landscape evolves, these types of scams have become more sophisticated, posing significant financial risks to organizations of all sizes.

Related: Siemens Energy guilty of wire fraud against GE and Mitsubishi

 

Pay stubs are essential in today's workplaces for both companies and workers. They include important details, including payments made, tax responsibilities, withholdings, and payment dates. However, the problem of fraudulent pay stubs is becoming more widespread, and it poses a risk to financial institutions as well as to people and organizations. The organization's stability and legal compliance depend on understanding how this type of fraud is perpetrated and how the offenders may be dealt with. 

Common Types of Pay Stub Fraud

Many people resort to several tactics of paystub deception to shirk their legal responsibilities and enjoy monetary benefits. The following are some of the most common:

  1. Fake employers: Whole companies are set up just to create false personnel records in this kind of fraud. People who want to participate in lending, leasing, or other financial transactions frequently use it.
  2. False Earnings: Another common method is an alteration of bonuses, additional working hours, or even changing the compensation figures on a pay stub. Businesses may misrepresent figures to evade tax or other liabilities; similarly, employees may indulge in such practices to obtain a bank loan or credit limit beyond what their salary can comfortably support.
  3. Underreporting Income: Conversely, failing to disclose income is another prevalent kind of pay stub fraud that aims to garnish wages or tax obligations. The offence of employers and employees conspiring with one another to gain an advantage is to pay more than one's actual earnings with the intent to conceal one's true income.
  4. Overreporting Income: Certain employees might provide information that they are making more salary than they earn to convince certain financial institutions, such as credit card providers, mortgage loan providers, and other lenders. In a bid to enhance their financial standing, this class of workers also exaggerates their wages, which places the banks or lenders at risk of defaults.

The Legal Ramifications of Pay Stub Fraud

Fake pay stubs cause losses for several businesses that rely significantly on employee paystubs, such as banks, telecom providers, and advertising agencies. No matter how elaborate or harmful the apoplexy may be, faking a pay stub is considered to bear some legal responsibility. For instance, there is a chance that procedures like fabricating pay stubs might violate federal regulations like the Fair Labor Standards Act (FLSA), which regulates legal activities regarding worker remuneration. Heavy fines and possibly jail time are the penalties for breaking the FLSA's fraud reporting regulations.

Some states have less inconsistent payroll fraud rules and enjoy allowing criminals and scammers to operate with impunity. If any of the workers or employers committed false reporting, net contempt damages may be sought in a lawsuit in any tort or breach of contract action.

Companies that manage finances where employees use bogus pay stubs can sue those workers criminally as well. One such accusation is bank fraud, which involves serious punishment, such as incarceration and hefty fees.

Detecting Fraudulent Pay Stub Practices

Companies need to understand the possibility of pay stub fraud to protect themselves. Employers and those working in payroll and human resources (HR) departments should be alert for any anomalies.

The following are some red flags that could indicate the occurrence of a fraud:

  • Weekly earnings statements that contain inconsistencies about overtime or monetary compensation received.
  • Discrepancies between the pay paid and the alleged amount of hours worked.
  • Paystubs with inconsistent text alignment and varied typefaces that seem to have been falsified.

Similarly, technology is essential for preventing scams. For example, the pay stub generator created by ThePayStubs.com facilitates the automation of the earning, deduction, and work duration tracking processes. When these specially designed solutions are implemented, the likelihood of making inadvertent errors or being dishonest is much reduced.

It is also obvious that verification techniques are required. For instance, employment contracts, timesheets, tax returns, and even bank deposit records might be used to confirm an employee's compensation. Additionally, to reduce the possibility of employing someone with a fabricated paystub, new candidates are typically asked to provide some sort of documentation attesting to their employment history.

Legal Steps in Prosecuting Fraudulent Pay Stub Cases

When schemes involving the use of fictitious pay stubs are discovered, the most typical response is to start the criminal prosecution. Typically, there are many steps in the prosecution process: 

  1. Reporting the Fraud: The fake pay stubs need to be reported to the appropriate authorities. This usually entails calling or visiting state labour departments as well as federal agencies like the Department of Labor. Additionally, banks may notify law enforcement about payment slip fraud.
  2. Gathering Evidence: It is quite difficult to find evidence to support a guilty conviction. In this instance, forensic detail is crucial. As a result, the employer ought to be able to account for all payroll documentation, including both original and altered pay slip copies. Additionally, revenue documents, employment contracts, and corporate records may support the argument.
  3. Legal Proceedings: One may be subject to both criminal and civil responsibility for pay stub fraud, just like for any other twisted turn in a particular system. For example, the prosecution for forgery and issuing false documents, peddling fraud, or promoting pyramid schemes or similar vices are only a few examples of cases that may be investigated in this way. In contrast to most other circumstances, the purpose of civil lawsuits, in this case, is not only to stop the fraud; rather, they are to compensate for the "costs" suffered as a result of the fraud, whereby mostly corporations and financial institutions seek to get damages.

The seriousness of the issue is somewhat explained by a few case studies of court cases using fictitious paystubs. In certain cases, it was noted that workers who falsified their paychecks to obtain credit were not simply fired; instead, they were prosecuted for crimes and given jail time and monetary fines.

Prevention Strategies for Businesses

A well-thought-out defense approach may not be enough to combat illegal pay stub practices and other types of deceit. Employers must implement strict policies and procedures that will drastically reduce the likelihood of these vices. Among the crucial actions are the following:

  1. Automating Payroll Systems: Every employee will receive accurate and proper paystubs if they choose trustworthy payroll services. The likelihood that an error will ever be purposeful or even unintentional is decreased by automation.
  2. Employee Education: Employers must periodically provide training on regulatory matters about payroll record manipulation. Additionally, this can deter the staff members from taking any needless actions.
  3. Audits and Reviews: It is good to undertake frequent payroll audits as a control measure. Issues like tax issues, inconsistencies between payment records and hours worked, etc., should be the focus of these checks.

Conclusion

One of the main goals of the majority of businesses and institutions, whether they are financial or not, is to identify and stop pay stub fraud. Excellent detection systems, vigilant monitoring, and excellent payroll administration assist the majority of businesses in avoiding any financial or legal exposure, even though such fraudulent behavior poses serious legal and financial risks. In addition to being genuine and accurate, these fraud protection tools are also helpful in making sure that pay stubs are appropriately formatted and devoid of false information for both the company and the employee.

Dark Mode

About Lawyer Monthly

Lawyer Monthly is a consumer-focused legal resource built to help you make sense of the law and take action with confidence.

Follow Lawyer Monthly