NAIROBI, KENYA — Kenyan detectives have successfully apprehended five individuals implicated in a sophisticated hacking operation that resulted in the fraudulent siphoning of over Ksh 3.2 million from a victim’s bank accounts.
The five suspects have been presented before the court following an intricate investigation.
The sequence of events leading to the discovery of the scheme began when the complainant, caught in traffic along Race Course Road, Nairobi was approached by two individuals feigning a minor traffic incident. Exploiting the distraction, one of the individuals swiftly stole the complainant’s mobile phone.
Subsequent investigations by detectives from Starehe Sub-County revealed a series of unauthorized transactions executed from the victim’s bank accounts immediately following the theft.
In the first account, a total of Ksh 1,892,625 was illicitly transferred. These transactions included Ksh 689,500 directed to various accounts under the name Fredrick Maina Wairimu, Ksh 299,500 transferred to Brian Machani, and Ksh 499,500 sent to Brian Obaye Kiveu. Additionally, Ksh 404,125 was initially routed to the complainant’s mobile phone and subsequently moved into encrypted Safaricom M-Pesa accounts.
The victim’s second bank account also incurred significant losses, with Ksh 1,311,615 being fraudulently withdrawn. This included transfers of Ksh 299,500 to Bonface Kirim Baimana, another Ksh 299,500 to John Erick Musyoki Kyengo, and Ksh 211,000 directed to Jambo Pay Trust. A further Ksh 501,615 was transferred to seven different Safaricom mobile numbers.
Utilizing forensic leads, detectives identified Fredrick Maina Wairimu as a key individual. During questioning, Wairimu implicated Peter Wandera Ouma, stating that Ouma had recruited him to register eleven bank accounts linked to Safaricom lines in exchange for Ksh 1,000 per account. These accounts were intended for Peter Kariuki Mathii.
The investigative trail continued to expand when Peter Wandera Ouma revealed his connection to Peter Kariuki Mathii through Hanington Kui Walubengo, who was subsequently arrested. Wairimu, Ouma, and Walubengo were arraigned before the Makadara Law Courts on April 28, 2025, where a 21-day custodial order was granted to allow detectives to further their inquiries.
Driven to dismantle the entire fraudulent network, detectives broadened their investigation, which led to the apprehension of Peter Kariuki Mathii in Ruiru town. Mathii was found in a Toyota Voxy, registration number KDN 566L, accompanied by Isaack Mugo Kanini.
A search of their vehicle yielded an array of incriminating evidence, including multiple Safaricom SIM cards, a SIM card registration device, counterfeit U.S. currency, and numerous ATM cards.
Also Read: Kenya’s DCI investigates cyberattack on its social media accounts
Interrogation of Mathii and Kanini led authorities to David Nganga Macharia, identified as the alleged mastermind behind the scheme. Macharia had been a wanted individual by the Directorate of Criminal Investigations (DCI) since 2019 for prior involvement in electronic fraud and hacking of bank systems, with an arrest warrant issued by the Milimani Court on January 24, 2019.
A search of Macharia’s navy-blue Subaru, registration number KDB 879M, resulted in the recovery of various account documents, multiple mobile phones, and papers resembling U.S. dollars. A subsequent search of his residence in Zimmerman uncovered further incriminating materials, including numerous SIM cards, multiple national identification cards, mobile phones, laptops, and additional ATM cards.
Peter Kariuki Mathii, Isaack Mugo Kanini, and David Nganga Macharia were arraigned at the Makadara Law Courts on May 5, 2025, where the court granted detectives a 10-day custodial order to finalize their investigations and potentially apprehend additional suspects.