Key Takeaways
- Tyler Robert Buchanan, a 24‑year‑old from Dundee, Scotland, pleaded guilty in a U.S. federal court to conspiracy to commit wire fraud and aggravated identity theft for a scheme that stole roughly $8 million in virtual currency.
- The fraud relied on phishing text messages that pretended to be from victims’ employers or suppliers, directing recipients to fake login pages where their credentials were harvested.
- Over a 19‑month span (Sept 2021–Apr 2023) Buchanan and his accomplices targeted at least 45 companies across the United States, Canada, India, and the United Kingdom.
- Buchanan faces up to 22 years in prison when sentenced on August 21; his three identified co‑conspirators remain charged and await trial.
- The case illustrates a growing wave of cyber‑enabled fraud, with the FBI reporting nearly $21 billion in losses to such scams in 2025, especially affecting Americans over 60, whose losses rose 37 % year‑over‑year to $7.7 billion.
Case Overview and Guilty Plea
Tyler Robert Buchanan, a 24‑year‑old resident of Dundee, Scotland, entered a guilty plea in the Central District of California’s federal court on charges of conspiracy to commit wire fraud and aggravated identity theft. According to the U.S. Department of Justice, Buchanan admitted to orchestrating a hacking operation that siphoned approximately $8 million in virtual currency from victims nationwide. The plea agreement covers a single count each of wire‑fraud conspiracy and identity‑theft aggravation, reflecting the core criminal conduct alleged by prosecutors. Buchanan’s admission marks a significant step in the government’s effort to hold accountable those who exploit digital vulnerabilities for financial gain, and it sets the stage for a sentencing hearing scheduled for August 21, where he could face up to two decades behind bars.
Phishing‑Driven Hacking Method
The fraudulent scheme relied primarily on sophisticated phishing text messages that masqueraded as legitimate communications from the victim’s employer or a contracted supplier. These messages typically warned recipients that their corporate accounts were about to be deactivated and urged them to click a supplied link to verify or restore access. When victims followed the link, they were redirected to counterfeit websites that closely mimicked the appearance of authentic corporate portals. Upon entering usernames, passwords, and sometimes multi‑factor authentication codes on these spoofed sites, the attackers harvested the credentials in real time. With the stolen login information, Buchanan and his associates gained unauthorized access to the victims’ virtual wallets and cryptocurrency exchanges, enabling the transfer of digital assets to accounts under their control.
Geographic and Corporate Scope
Court documents reveal that the conspirators targeted at least 45 distinct companies spanning multiple continents. Victims included organizations based in the United States, as well as firms located in Canada, India, and the United Kingdom. The broad geographic reach underscores the transnational nature of modern cybercrime, where perpetrators can operate from one jurisdiction while exploiting victims worldwide. By casting a wide net across industries and regions, the group increased the likelihood of finding susceptible employees who would respond to the urgent‑tone phishing lures. The diversity of targets also complicated investigative efforts, requiring coordination among law‑enforcement agencies in several countries to trace the flow of stolen funds and identify the individuals behind the operation.
Legal Charges and Potential Sentence
Buchanan’s guilty plea encompasses two federal offenses: conspiracy to commit wire fraud, which criminalizes the planning and execution of a scheme to defraud using interstate communications, and aggravated identity theft, which imposes a mandatory consecutive sentence when identity theft is committed in relation to certain felonies, including wire fraud. The wire‑fraud conspiracy charge alone carries a maximum penalty of 20 years imprisonment, while the aggravated identity theft count adds a statutory minimum of two years that must be served consecutively to any other sentence. Consequently, Buchanan faces a possible total of up to 22 years in federal prison. The upcoming sentencing hearing on August 21 will allow the court to consider factors such as the scale of the theft, the impact on victims, Buchanan’s role in the conspiracy, and any mitigating circumstances before imposing a final term.
Status of Co‑Conspirators
While Buchanan has accepted responsibility, three alleged accomplices remain charged and have not yet entered pleas. Ahmed Hossam Eldin Elbadawy, 24, known online as “AD,” resides in College Station, Texas; Evans Onyeaka Osiebo, 21, lives in Dallas, Texas; and Joel Martin Evans, 26, who goes by the moniker “joeleoli,” is based in Jacksonville, North Carolina. Federal prosecutors allege that each played a distinct role in the scheme—ranging from crafting the phishing messages and hosting the fraudulent websites to facilitating the laundering of stolen cryptocurrency. Their continued prosecution highlights the government’s strategy of dismantling the entire network rather than focusing solely on the individual who pleaded guilty. The outcome of their cases will likely influence sentencing considerations for Buchanan, particularly if any co‑conspirators provide cooperation or testify against him.
Broader Cyber‑Enabled Crime Trends
The Buchanan case exemplifies a escalating pattern of cyber‑enabled fraud that the Federal Bureau of Investigation highlighted in an April 2025 report. According to the FBI, scams leveraging social engineering, digital messaging, and artificial intelligence defrauded Americans of nearly $21 billion in that year alone. Notably, individuals aged 60 and older emerged as the most vulnerable cohort, reporting losses of approximately $7.7 billion—a 37 % increase from the previous year. This demographic’s heightened susceptibility is often attributed to factors such as reduced familiarity with emerging technologies, greater trust in seemingly official communications, and limited access to rapid fraud‑resolution resources. The report emphasizes that fraudsters are increasingly employing AI‑generated text and deep‑fake audio to make their lures more convincing, thereby lowering the technical barrier for conducting large‑scale identity‑theft and wire‑fraud operations.
Implications for Prevention and Enforcement
The convergence of a high‑value, transnational cryptocurrency theft scheme with broader statistics on elder‑targeted scams underscores the need for multifaceted defensive strategies. Organizations should implement robust employee‑training programs that teach staff to scrutinize unexpected messages urging immediate action, verify sender authenticity through independent channels, and report suspicious communications to IT security teams. Simultaneously, public‑awareness campaigns aimed at older adults can help them recognize common phishing cues and adopt safeguards such as enabling multi‑factor authentication and regularly monitoring financial accounts. From a law‑enforcement perspective, the Buchanan prosecution illustrates the value of cross‑border cooperation, as investigators traced illicit cryptocurrency flows across multiple jurisdictions to identify and apprehend the perpetrators. Continued investment in cyber‑crime units, advanced blockchain‑analysis tools, and international legal frameworks will be essential to deter similar schemes and protect both corporate and individual assets in an increasingly digital economy.

