By Dorothy Musyoka
Detectives from the Directorate of Criminal Investigations (DCI) have arrested six suspects linked to a sophisticated caller ID spoofing syndicate that defrauded unsuspecting victims of millions of shillings through high-level electronic fraud.
The suspects identified as Fortune Muthina Kinyanzui alias Albanas Kyalo (believed to be the mastermind), Ruel Kipkoech Yator alias Papa Ruel, Laban Kipkirui Koech, Weldon Kipyegon Rono, Towet Kipkorir Alphonce, and Kelvin Kipyegon Koech—were apprehended during a sting operation mounted in Nyali, Mombasa County.
The operation, which commenced on May 31 following an intelligence tip, targeted the gang’s hideout at APA Apartments, House No. B2 (AirBnB) along 1st Avenue in Nyali.
The premises had reportedly been converted into a full-fledged cybercrime hub, used both for training new recruits and executing fraudulent operations.
The suspects are accused of employing a caller ID spoofing application to manipulate phone calls, making them appear as if originating from legitimate sources such as bank and telecommunications customer care desks.
By masquerading as official agents and creating a false sense of urgency, the fraudsters would deceive their victims into revealing sensitive personal information, which was then used to siphon large sums of money from their bank and mobile money accounts.
According to investigators, the spoofing application reportedly sold and configured at a price exceeding Ksh.500,000 was in high demand among cybercriminal circles, including the notorious ‘Mulot Swapper’ network.
“Fortune Muthina (mastermind) is believed to possess the spoofing application which he used to aid the infamous ‘Mulot Swapper’ fraudsters at a fee to make calls to victims while masquerading customer care service desk attendants in banks and telecommunication offices,” noted the detectives.
“So demanded was the App that the fraudsters had to part with over Sh 500,000 to acquire, have it configured and be provided with an IP address to facilitate their malicious activities,” added the DCI.
During the raid, detectives recovered 19 assorted mobile phone handsets, SIM cards from various service providers (including Safaricom, Airtel, Telkom, and MTN Uganda), SIM card holders, and a notebook believed to contain potential victims’ information.
The evidence is currently under forensic analysis.
The suspects were presented before Kahawa Law Courts on June 3, 2025, where the investigating team sought custodial orders to finalize their probe.
Magistrate Court No. 2 directed that the matter be mentioned again on June 6, 2025, for a ruling.
In the meantime, the suspects are being held at Capitol Hill Police Station.
The Directorate of Criminal Investigations has advised anyone who believes they may have fallen victim to this syndicate to report to their nearest police station and coordinate with DCI Headquarters for further guidance.