Case 2: The perfect crime that wasn’t

The first thing they stole was time.

For nearly two years, a group of insiders siphoned money from the bank, moving it in plain sight. It was a slow, calculated bleed so precise that no one noticed. Not the managers. Not the compliance officers. Not the regulators.

When an overworked auditor stumbled upon the first red flag, it was already too late. Ugx. 6.31 billion had vanished.

This wasn’t a cyberattack. It wasn’t some hacker typing away on a keyboard in a dark room. The real criminals were inside the building.

a) The illusion of money

It started with a simple observation: banks move money in bulk, but they verify in detail.

That was the weakness.

The mastermind a senior IT consultant knew how the bank processed transactions. He understood the batching system used to settle payments. It was designed for efficiency, but it had a flaw:

(i) Small adjustments in individual transactions were rarely flagged.

(ii) Internal approvals for bulk transfers relied on pre-set automation rules, not manual oversight.

(iii) Reconciliation happened at the end of each business day, meaning any temporary gaps in the books would correct themselves overnight.

He didn’t have direct access to the funds. But he had access to the system that controlled them.

b) The inside men

He needed someone on the inside. Someone with banking privileges. That’s where his accomplice came in a trusted mid-level officer in the transaction approval department.

Together, they designed the scheme.

(i) Identify dormant accounts that had minor balances but were still active.

(ii) Modify internal routing instructions to skim money from legitimate transfers.

(iii) Move stolen amounts into temporary holding accounts, disguised as vendor payments or refunds.

(iv) Use multiple smaller withdrawals instead of large, obvious transactions.

(v) Convert the money into crypto and offshore accounts before the system auto-corrected the missing funds.

Every day, the bank processed thousands of transactions. The amounts they took were so small that no one noticed. At first.

c) The movement of money

The fraud depended on speed. The stolen money never sat in one place for long.

(i) Stage One The Source

Each week, they selected real client transactions moving between corporate accounts. Using internal access, they altered the batch approvals, diverting small amounts typically between Ugx. 500,000 and Ugx. 2 million into a network of shell accounts.

(ii) Stage Two   The Cleansing

The stolen amounts were then moved to temporary internal accounts, labeled as refunds, fee reversals, or system adjustments. From there, the funds were transferred in chunks of Ugx. 10 million to Ugx. 50 million to accounts registered under fake suppliers.

(iii) Stage Three  The Disappearance

The final step was laundering the money through crypto transactions and foreign remittances. They purchased USDT (Tether) a cryptocurrency that mirrored the dollar before converting it back to cash through private money dealers.

Once the money reached these accounts, it was gone. Untraceable.

For nearly twenty-one months, they repeated this cycle. Stealing. Cleaning. Disappearing.

d) The red flag

The scam should have worked forever. It almost did.

But then, an auditor noticed something unusual.

It wasn’t a missing payment. It wasn’t a huge deficit. It was just a pattern something that shouldn’t have been there.

(i) Some refund transactions were too consistent always rounding off at Ugx. 10 million or Ugx. 15 million.

(ii) The account numbers used for internal adjustments kept appearing in different reports linked to unrelated transactions.

(iii) A bulk transfer batch showed the same approval ID across multiple payments an anomaly that should have been impossible.

That’s when she pulled the records. And what she saw didn’t make sense.

e) Following the money

Once the first inconsistency was flagged, the fraud team moved fast.

(i) They cross-checked every transaction involving the flagged accounts. What should have been a one-time refund process was recurring, structured, and systematic.

(ii) They ran timestamp comparisons on the internal approvals. The same login credentials had been used in multiple locations at the same time an obvious sign of credential sharing.

(iii) They tracked the crypto transactions. The moment they saw repeated purchases of USDT through peer-to-peer markets, they knew.

This wasn’t an error. This was a fraud.

f) The collapse

Within 48 hours, the bank froze the flagged accounts. But the criminals had already sensed trouble.

The IT consultant disappeared. Booked a flight out of the country before the investigation was made public.

His inside man wasn’t so lucky. He was arrested at his desk.

By the time the dust settled, Ugx. 6.3 billion was gone.

g) Lessons from the breach

(i) The most dangerous fraudsters are insiders. External hackers get the headlines, but internal access is the real threat.

(ii) Small thefts add up. No one steals Ugx. 6.3 billion in one day. They steal Ugx. 1 million a thousand times.

(iii) Reconciliation doesn’t mean security. Just because a bank balances its books at the end of the day doesn’t mean the money wasn’t stolen along the way.

(iv) Crypto is the ultimate escape route. If fraud detection doesn’t happen fast, the stolen money is converted into digital assets and disappears forever.

h) The final move

The IT consultant made a mistake.

He thought he had covered his tracks. Thought he had outsmarted the system.

But he underestimated human intuition.

It wasn’t a firewall that caught him. It was an auditor with a sharp eye.

And in the end, that’s all it takes.

Leave a Reply

Your email address will not be published. Required fields are marked *

About Company

At the Institute of Forensics & ICT Security (IFIS), we specialize in bridging the gap between knowledge and application.

Most Recent Posts

  • All Posts
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

Category

Tags

You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Quick links

Contact Us

Cyber Security Conference

Experiences & Testimonials

Resources

Free Downloads

Surveys

Quizzes

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd