Police arrest leader of Mulot gang that stole 900k from MP’s bank account

3 Min Read
David Mutai alias Hillary Langat Matindwet who has been identified as the ring leader of the Mulot gang

Police have arrested the leader of the Mulot sim swap syndicate that stole over Sh900,000 from an MP’s bank account while he was out of the country on official duty.

David Mutai alias Hillary Langat Matindwet has this morning December,30 been apprehended at a KCB Bank in Kericho town. Kericho town.

The Directorate of Criminal Investigations (DCI) had said on Wednesday that the gang siphoned Sh941,000 from a bank account belonging to a the legislator from Rift Valley, who was out of the country on official duties between December 2 and 3 this month.

“Following the incident reported by the legislator, one of Mutai’s lieutenants Justus Rono, 28, was tracked down by detectives and arrested in the fraudsters paradise of Mulot, a dusty town shared between Bomet and Narok counties,” said the DCI.

- Advertisement -

“Rono, who disguises himself as a boda boda rider is one of the main suspect’s trusted allies, who ferries him on his bike discreetly to avoid detection from our hawk-eyed sleuths. Images of Rono showing off wads of cash following some of the successful operations that they have conducted, were also obtained by the detectives,” said the DCI.

According to the investigative agency a second suspect identified as Kevin Kiplagat was apprehended early this week at Sigor market Bomet county.

“The fraudsters who have also perfected the act of impersonating senior government officials recently obtained an unspecified amount of money from unsuspecting members of the public, after posing as a senior state official who would influence employment and business opportunities at a fee,” said the DCI.

The suspects who have registered multiple SIM cards using details from fraudulently acquired identification documents deposit the siphoned money to different Mpesa accounts, in a bid to make it difficult for detectives for track them down.

In most instances, the fraudsters working in cahoots with rogue banking officials pose as customer care agents from banks then ask for a customer’s account number, PIN, as well as details of the last transaction on the targeted account. They then use the details to duplicate the victims’ account and after a successful SIM swap, the account is swept clean in a matter of seconds.

Kindly leave a comment

Share this Article
Leave a comment