Detectives Nab Three Suspects in Meru Linked to SIM Swap Fraud Targeting Bank Accounts

Akoth
0
Detectives from the Directorate of Criminal Investigations (DCI) have dismantled a three-man cyber fraud syndicate in Meru, believed to have orchestrated SIM swap scams that drained money from unsuspecting Kenyans.

In a statement issued on Wednesday, April 15, 2026, the Directorate said the three suspects were arrested following a coordinated operation involving officers from DCI headquarters and their counterparts in Meru.

“A team of detectives drawn from DCI Headquarters, in collaboration with their Meru-based counterparts, has dismantled a notorious three-man cyber fraud syndicate that has been hacking into emails, swapping SIM cards and bleeding Kenyans’ bank accounts dry,” DCI stated.

According to investigators, the suspects are linked to a series of cyber fraud incidents in which victims lost significant sums of money through unauthorised transactions.

The syndicate is said to have relied on sophisticated tactics, including gaining access to victims’ email accounts before initiating SIM swap requests that allowed them to take control of mobile phone lines.

Once in control of the phone numbers, the fraudsters allegedly bypassed security measures tied to mobile banking and other financial services, enabling them to access bank accounts and transfer funds without the account holders’ knowledge.

The DCI said forensic investigations played a crucial role in tracking down the suspects.

Detectives followed digital trails that eventually led them to the syndicate’s hideout in Meru, where the three were apprehended.

Authorities have not disclosed the identities of the suspects but indicated that investigations are ongoing to establish the full extent of the syndicate’s operations, including the number of victims affected and the total amount of money lost.

The arrests highlight growing concerns over cybercrime in the country, particularly SIM swap fraud, which has become increasingly common in recent years.

Criminals often exploit personal data obtained through phishing schemes or data breaches to execute such attacks.

Tags

Post a Comment

0 Comments

Post a Comment (0)

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Check Out
Ok, Go it!
To Top