The Nigeria Police Force National Cybercrime Centre, NPF NCCC, in collaboration with the United States Federal Bureau of Investigation, FBI, and the US Secret Service, has arrested three suspected high profile internet fraud operatives in Lagos and Edo states.
The arrests followed a coordinated intelligence driven operation targeting a sophisticated cyber fraud network accused of carrying out targeted attacks on the email systems of major corporate organisations, largely within Nigeria but with impacts across multiple jurisdictions.
In a statement issued on Thursday, the Force Public Relations Officer, CSP Benjamin Hundeyin, said the suspects were involved in large scale cybercrime activities through the use of phishing links and malicious software designed to compromise corporate email accounts.
According to Hundeyin, the operation was launched after the police received credible and actionable intelligence from Microsoft Corporation in collaboration with the FBI. The intelligence revealed the use of an advanced phishing toolkit known as RaccoonO365, which was allegedly deployed by the suspects to steal login credentials.
He explained that the phishing toolkit was designed to create fake Microsoft login portals that closely resembled legitimate authentication pages. These fake portals were used to harvest usernames and passwords, allowing the perpetrators to gain unauthorised access to Microsoft 365 email accounts belonging to corporate, financial, and educational institutions.
Investigations revealed that between January and September 2025, several incidents of unauthorised access to Microsoft 365 accounts were traced to phishing emails crafted to deceive users into entering their login details. These breaches reportedly led to business email compromise, data theft, and significant financial losses.
Following the intelligence, operatives of the NPF NCCC were deployed to Lagos and Edo states, where three suspects were arrested during coordinated raids. Search operations conducted at their residences led to the recovery of laptops, mobile phones, and other digital devices believed to have been used in carrying out the cyber attacks. Forensic analysis reportedly linked the recovered equipment to the fraudulent activities.
Further investigations identified one of the suspects, Okitipi Samuel, also known by the aliases RaccoonO365 and Moses Felix, as the principal suspect and the alleged developer of the phishing infrastructure. Police said he operated a Telegram channel where phishing links were sold to other cybercriminals in exchange for cryptocurrency.
Authorities also disclosed that the suspect hosted fraudulent Microsoft login portals on Cloudflare servers using stolen or illegally obtained email credentials, enabling the widespread distribution of phishing campaigns.
However, investigators noted that there was no evidence linking the two other arrested individuals to the creation or direct operation of the phishing toolkit, although investigations are ongoing to determine the full extent of their involvement.
The Nigeria Police Force reaffirmed its commitment to protecting Nigeria’s digital space, stressing that the arrests reflect the growing strength of international cooperation in combating cybercrime. Hundeyin said the force would continue to deploy advanced technology, strengthen global partnerships, and pursue diligent investigation and prosecution to counter emerging cyber threats.
The suspects are expected to be charged to court upon the conclusion of investigations, as authorities continue to unravel the scope of the cyber fraud operation and identify possible accomplices both within and outside Nigeria.

Comments
Post a Comment