Iphone 17 Pro Max, Cars & Crypto Seized As Police Bust 11 EcoCash Scammers In $22k Operation
According to a ZRP arrest sheet circulated this week, detectives from CID Homicide Harare arrested a syndicate of 11 young men (aged between 21 and 26) recovering property worth an estimated US$22,000.
While $22,000 might not sound like a “heist” in corporate terms, in the context of individual EcoCash wallets, where many victims lose amounts ranging from $10 to $20, this represents hundreds, if not thousands, of scammed Zimbabweans.
Cars, Crypto, and “InDrive”
According to the ZRP, the arrests led to the recovery of several high-value items that provide a window into the scammers’ economy:
The group allegedly purchased 2 cars; a Toyota Spade specifically to run as an InDrive, a classic move to “clean” scammed money through a legitimate-looking transport business. They also purchased a Nissan Note.
One of the alleged scammers is said to have admitted to investing a portion of the stolen funds into Cryptocurrency. Crypto is a go-to for local cybercriminals allowing them to move money across borders. In another investment scam, called eCreator that we covered some years ago, money would also move through crypto.
The sheer volume of hardware recovered is staggering. Police seized over 100 sim cards and high-end smartphones, including iPhone 17 Pro Max, iPhone 16 Pro Max, Samsung S25, and S23 models.
The suspects also reportedly kitted out their residences with brand-new beds, sofas, televisions, fridges, and stoves – all allegedly bought with “stolen money.”
Apparently, in addition the the $22k, other money was frozen after EcoCash blocked a wallet before the money could be cashed out. This suggests that EcoCash’s internal fraud monitoring systems were catching some of these transactions.
How they did it (a refresher)
The arrest sheet confirms exactly what we explained in January. The group sent links pretending to be Econet offering “free data.” Once the victim clicked and followed instructions, the scammers would call and ask for the OTP (One-Time Password).
That OTP was the “key to the cabinet.” Once they had it, they didn’t need to hack EcoCash; they just logged in as the user and moved the money to their network of “agent” lines.
What is perhaps most notable is the concentrated nature of this group. All 11 suspects are from Chitungwiza (specifically Units D, B, and E). They are all “not employed”.
It’s highly unlikely that these are the only EcoCash scammers. We hope to get more details, hopefully through the courts, of how exactly they did this, so at least there’s more insight into the problem.
Here’s the full Text of the Police Arrest Sheet:
ARREST SHEET 05/02/25
ACCUSED:
Mpho Ruzwidzo aged 22 years NR: 63-2469484 F43 Res: 3377 Unit D Chitungwiza Bus: Not employed
Ishmael Muzanenhamo NR Not held Res 19730 Zengeza Extension Chitungwiza District Dema, Chief Seke, Village Musoko, Headman Bus Not employed
Moses Shingirai Chawatama aged 24 years NR: Unknown Res: 3378 Unit D Chitungwiza Bus: Not employed
Usher Forester Mubaiwa aged 26 years NR: 59-198052-H-15 Res: 3248 Unit D, Seke Chitungwiza Bus Not employed
Panashe Wesley Gonzo aged 22 years NR: 63-2918390-K-42 Res: 3392 Unit D Chitungwiza Bus: Not employed
Tinashe Gonzo aged 24 years NR: 63-307890-P-71 Res 3392 Unit D, Seke Chitungwiza Bus Not employed
Eddington Leeroy Mazonde aged 21 years NR: 59-222295-3-07 Res: 3800 Unit D Chitungwiza Bus Not employed
Calvin Takudzwa Masiyandaita aged 23 years NR 86-111010-Y-86 Res 5292 Unit E, Seke Chitungwiza Bus Not employed
Shawn Goodmore Chikangaidze aged 22 years NR: 63-341607-H-25 Res: 3379 Unit D Chitungwiza Bus Not employed
Billy Zawe aged 21 years NR: Unknown Res 12 Mbambaira, Zengeza 2, Chitungwiza Bus Not employed
Dilan Macheka aged 22 years NR: 63-2374267-H-42 Res: 63267 Unit B Chitungwiza Bus Not employed
Circumstances
During the period extending from 2025 to date, in and around Zimbabwe they had been an upsurge of Theft cases perpetrated by the accused persons through Ecocash Zimbabwe. The accused person would send a link to the victims, pretending to be Econet Zimbabwe. The link would appear as a portal to gain access to free data. Once the victim followed the link’s instructions they would call the victims requesting for an OTP sent to the victims cellphone. This would give the accused person access to the victims Ecocash hence they would transfer funds from the victims to various ecocash accounts. On 4 February 2026, using the “follow the money trail” detectives from CID Homicide Harare were able to identify the first accused person.
Detectives proceeded to Chitungwiza and waylaid the accused person close to his residence. At 2200 hours, accused 1 and 2 arrived driving a Nissan Note, peach in colour and were swiftly arrested. On interviewing the accused persons, they admitted being a syndicate of 10 accused persons forming the whole network. On searching the accused persons, detectives were able to recover 5 cellphones, all with econet lines used in the commission of the crime. Also recovered were econet Sim cards and cash amounting to US600-00. Accused 1 and 2 also indicated detectives to the property purchased using the stolen money. This includes, beds, sofas, televions, a fridge, wardrobe, stove, plates, blankets.
On enquiring from the accused persons were the rest of the money was they stated they had purchased a Toyota spade on registration AGW 5666 for indrive (yet to be recovered) and a Nissan Note on registration AGG5665 Accused 1 further stated that he had invested a certain amount of money in Crypto currency. He further went on to say one of his sim cards which had received the money had been blocked and had not been able to withdraw it.
On 5 February 2026 Detectives made further follow ups and arrested accused (3-11) at their place of residence. Accused (3) who led to the recovery of 15 Buddie lines, Samsung S25, Samsung S23 and Samsung A03 cellphones. Accused (4) led to the recovery of 16 buddie lines, Samsung S22 plus, Samsung 36 and Samsung A15 cellphones. Accused (5) led to the recovery of S10 Ultra tablet, Non working Mac book and cash US$1 200-00. Accused (6) led to the recovery of 15 buddie lines, Samsung A05 and Iphone 15 promax cellphones. Accused (7) led to the recovery of Iphone 14 promax, Redmi cellphone and cash US$310-00. Accused (8) led to the recovery 21 Buddie lines, Iphone 16 pro-max and non-working Itel cellphone. Accused (9) led to the recovery of 20 Buddie lines, Samsung A03, Samsung Note 20 and Tablet cellphone. Accused (10) led to the recovery of Iphone 17 promax and cash U$300-00. Accused (11) led to the recovery of 6 buddie line, Iphone 13 promax and cash US$150-00.
Value recovered estimated $ 22 000.
Source: Techzim

