The Nigeria Police Force, through its National Cybercrime Centre, has apprehended high-profile internet fraud suspects involved in targeted cyberattacks against the email systems of major corporate organisations, utilising phishing links and malicious software.
In a Thursday statement signed by Force spokesperson CSP Benjamin Hundeyin, the arrest followed credible and actionable intelligence gathered from the Federal Bureau of Investigation (FBI), revealing the cyber attacks carried out against Microsoft Corporation, United States of America, through the use of a sophisticated phishing toolkit known as RaccoonO365 on Microsoft Corporation, United States of America.
According to the statement, the toolkit was designed to create fraudulent Microsoft login portals aimed at harvesting user credentials and unlawfully accessing the email platforms of corporate, financial, and educational institutions.
The statement reads, “Consequently, the NPF–NCCC initiated a coordinated, intelligence-driven operation in collaboration with Microsoft, the FBI, and the United States Secret Service. Investigations traced multiple incidents of unauthorised Microsoft 365 account access between January and September 2025 to phishing emails crafted to closely mimic legitimate Microsoft authentication pages.
“These activities resulted in business email compromise, data breaches, and financial losses across multiple jurisdictions.”
The statement added, “Acting on precise and actionable intelligence, NPF–NCCC operatives were deployed to Lagos and Edo States, leading to the arrest of three suspects. Search operations conducted at their residences resulted in the recovery of laptops, mobile devices, and other digital equipment, which have been linked to the fraudulent scheme after forensic analysis.
“Further investigations identified Okitipi Samuel, also known as “RaccoonO365” and “Moses Felix,” as the principal suspect and developer of the phishing infrastructure. Investigations reveal that he operated a Telegram channel through which phishing links were sold in exchange for cryptocurrency and hosted fraudulent login portals on Cloudflare using stolen or fraudulently obtained email credentials.”
“Notably, investigations revealed no evidence linking the two other arrested individuals to the creation or operation of the phishing scheme,” the statement concluded.
The Force reaffirmed its steadfast commitment to safeguarding Nigeria’s digital space through the deployment of advanced technology, strengthened international partnerships, and diligent investigative and prosecutorial processes aimed at effectively countering evolving cyber threats.




