Directorate of Criminal Investigations (DCI) detectives have arrested six persons of interest linked to a sophisticated fraud scheme using caller ID spoofing to syphon millions from unsuspecting victims.
The operation, conducted in Nyali, Mombasa County, targeted a group of cybercriminals who had turned a short-stay home apartment into their operational base, exposing the growing menace of digital fraud in the region.
The persons of interest, identified as Fortune Muthina Kinyanzui (alias Albanas Kyalo), Ruel Kipkoech Yator (alias Papa Ruel), Laban Kipkirui Koech, Weldon Kipyegon Rono, Towet Kipkorir Alphonce, and Kelvin Kipyegon Koech, were apprehended following an intelligence-led sting operation that began on May 31, 2025.
DCI, in a statement issued on June 4, 2025, said the raid uncovered a well-orchestrated scheme where the fraudsters used a caller ID spoofing application to disguise their identities, impersonating customer service representatives from banks and telecommunication companies.
“Six cybercrime suspects implicated in a series of serious fraud through spoofing to dupe their targets, whereafter they syphon millions of cash electronically, have been arrested in a security operation conducted in Nyali, Mombasa County. Fortune Muthina Kinyanzui, alias Albanas Kyalo, Ruel Kipkoech Yator, alias Papa Ruel, Laban Kipkirui Koech, Weldon Kipyegon Rono Towet Kipkorir Alphonce and Kelvin Kipyegon Koech were flushed from their hideouts by a team of detectives led by the Operations Directorate,” the DCI statement read in part.
“The operation that started on May 31 followed an intelligence tip, after which the officers mounted a sting operation targeting the fraudsters who social-engineer their victims by use of a call spoofing application to disguise their identities through manipulation of phone calls and numbers to make them appear as if they were originating from authentic call centres.”
Spoofing app
According to the DCI, the mastermind, Fortune Muthina, possessed the spoofing app, which the group had acquired for over Ksh500,000. The application allowed them to manipulate phone calls and numbers, making them appear as if they originated from legitimate call centres.
They are said to have employed social engineering tactics, creating panic and urgency to trick victims into revealing sensitive personal information, such as ATM PINs and banking details. This information was then used to transfer large sums of money into the suspects’ accounts.
“Fortune Muthina (mastermind) is believed to possess the spoofing application, which he used to aid the infamous ‘Mulot Swapper’ fraudsters at a fee to make calls to victims while masquerading as customer care service desk attendants in banks and telecommunication offices,” DCI stated.
“By deception that causes panic and a sense of urgency, the victims are made to reveal personal information that the fraudsters use to transfer huge sums of money to their accounts. So demanded was the app that the fraudsters had to part with over Sh 500,000 to acquire it, have it configured and be provided with an IP address to facilitate their malicious activities.”
Training and working station
DCI says the officers raided APA apartments Hse no. B2 located along 1st Avenue in Nyali, Mombasa County, where the six had set base.
According to the anti-crime agency, the house had been turned into their training and working station.
In their possession were found 19 assorted mobile phone gadgets, assorted SIM cards and SIM card holders (Safaricom, Airtel, Telkom and MTN Uganda), and a book containing possible victims’ records.
The six have been detained at Capitol Hill Police Station after they were arraigned at the Kahawa Law Courts on June 3, 2025, where the DCI sought more time to conclude their investigations.
Those who might have fallen victim to the fraudsters have been advised to follow up with the respective stations investigating their cases for further communication with DCI Headquarters on the next course of action.
