How MTN Nigeria’s web-based platform was allegedly hacked — SFU


The Special Fraud Unit (SFU) of the Nigeria Police Force (NPF) has hinted to Justice Akintayo Aluko of the Federal High Court, Ikoyi, Lagos, as to how two suspected hackers, Timothy Oluwabukola and Anthony Odemerho allegedly broke into the system of MTN Nigeria Communication computers and stole airtime and data valued at N1.9bn.

The SFU made the revelation during the arraignment of the suspected hackers before the court. 

While the arraignment of Timothy Oluwabukola and Anthony Odemerho was executed on July 30, 2024, on four counts of conspiracy, unauthorised access, and unlawful conversion, counsel for the SFU, Justin Enang told the court that the suspected hackers alongside others at large allegedly hacked into the MTN web-based platform and stole airtime and data valued at N1.9bn between January and April 2024.

But the suspected hackers pleaded not guilty and Justice Aluko granted them bail in the sum of N50m after entertaining their separate bail applications.

In granting the duo bail, Justice Aluko directed the suspected hackers to provide two sureties each.

One of the sureties, according to the judge, must be a civil servant in federal or Lagos State employment, at grade level 14 and above, while the second surety must be a landed property owner within the jurisdiction of the court.

Justice Aluko further ordered the verification of all documents submitted by the sureties, including their residential addresses, adding that the suspected hackers are to be remanded in custody until their bail conditions are fulfilled.

All rights reserved. This material and other digital content on this website may not be reproduced, published, broadcast, rewritten, or redistributed in whole or in part without the prior express written permission of THE NEWS ACCELERATOR NETWORK.

For advertising inquiries, news coverage or press releases, contact thenewsacceleratornetwork@gmail.com or 08051017159.


Post a Comment

To be published, comments must be reviewed by the administrator *

Previous Post Next Post
"