Two youths, one masquerading as an Airtel Field Services Engineer are on the rampage conning unsuspecting Kenyans using technology.
Other than draining all their Mpesa accounts, ‘engineer Evans’ according to his fake Airtel name tag is also leaving his victims broke by obtaining credits from the M-Shwari, Fuliza and KCB Mpesa accounts.
The techno-savvy cons are particularly operating within Mt Kenya region and are driving in a white Toyota saloon Reg. NZE.
Yesterday at Makutano market along the Mwea- Embu road, one of them approached a resident Jacinta Wambui, who had parked her vehicle near a petrol station while flashing his Airtel staff card.
“AM EVANS, AN AIRTEL FIELD SERVICES ENGINEER AND WE ARE TESTING THE STRENGTH OF OUR NETWORK IN THIS AREA IN ORDER TO OFFER OUR CUSTOMERS THE BEST SERVICES, “HE REPORTEDLY TOLD THE WOMAN
He also sought to know if the victim was using a 2G or 4G sim card and in the process was given her smartphone to check.
“IN A FRACTION OF A SECOND HE GAVE ME BACK MY HANDSET AND A 4G TELKOM LINE WHICH I LATER REALIZED WAS UNSEALED BEFORE THEY DROVE OFF TOWARDS THE NGURUBANI TOWN DIRECTION, “THE VICTIM SAID.
It only emerged later while fueling her vehicle that she had been conned of Sh 4,400 by the smart criminals in broad daylight. That’s after her MPESA account failed to transact Sh 1,000 through the petrol station till number.
“ON CHECKING, I FOUND THE SH 1,000 IN MY MPESA ACCOUNT HAD BEEN WITHDRAWN AND THE TRANSACTION MESSAGE DELETED WHILE THE FRAUDSTERS HAD ALSO OBTAINED FROM FULIZA SH 3,400 LEAVING ME COMPLETELY DRY, “SHE SAID.
The victim had to borrow from a friend whom she instructed to send the Sh 1,000 direct to the petrol station till number while she also reported the matter to both the Airtel and Safaricom services providers since it was through a Safaricom line 0704873631, the criminal transaction was affected.
Later on, checking through the true caller application, it emerged the supper con name was not Evans but Brian Ombeta. He switched off the line immediately and had remained so up to this moment.
The victim suspected the conmen were either former employees of the mobile service providers or working in cahoots with some insiders within the networks even as she appealed to security personnel to apprehend the culprits before they rob other unsuspecting Kenyans.