The operatives of the Economic and Financial Crimes Commission (EFCC) have arrested 108 suspected internet fraudsters in Osun and Cross River states.
64 suspected internet fraudsters were arrested by the EFCC operatives in Osun State, while 44 suspects were nabbed in Cross River State.
The anti-graft agency, in a statement on Friday, May 10, 2023, disclosed that the suspected cybercriminals were arrested in the Ede area of Osun State on Wednesday, May 8, following actionable intelligence on their suspicious fraudulent activities in their environs.
The commission listed items recovered from the suspects to include 18 exotic vehicles, 18 laptops, 112 mobile phones, three Play Station games, five motorcycles, and other incriminating documents, among others.
Court jails 41 internet fraudsters in Anambra
“They will be charged to court upon conclusion of investigations,” the EFCC added.
The EFCC, in another statement, revealed that its investigators at the Uyo Zonal Command arrested 44 suspected internet fraudsters in Cross River State.
The anti-graft agency said the suspected internet fraudsters were arrested in an early morning sting operation on Thursday, May 9, at Satellite Town, Tinapa junction, and parliamentary extension areas of Calabar, the Cross River State capital.
The EFCC said items recovered from the suspects were six exotic cars, 16 laptops, and 38 mobile phones.
It noted that the suspects would be charged to court as soon as investigations are concluded.
Liverpool moved four points clear at the top of the Premier League after both Luis…
Bournemouth thrashed Manchester United 3-0 in the Premier League at a chilly Old Trafford on…
Nuhu Bamali Polytechnic has commended Kaduna State Governor Uba Sani for increasing the retirement age…
Former Vice President Atiku Abubakar says the 2025 budget presented by President Bola Tinubu to…
The Ijaw Youths Network has raised the alarm over the intensified blackmail of huge international…
The operatives of the National Drug Law Enforcement Agency (NDLEA) have foiled an attempt by…
This website uses cookies.