What's new

Indian scam call centers looted over $10 billion in 11 months from US senior citizens

"YOU LOT" I despise the Indians and their scams probably more than you do. Can you even read? Do they not have proper schools in whatever PIND you are from? Learn some English first and stop being a troll.
Why taking it out on the pind ppl, it is you lot (Indians) who cause the massive majority call centre scams, the articles we list above also state this.
 
You Indians probably know enough tech and English to scam?

Jibes and jokes aside - I do concede India developing its IT and BPO services economy. But for all of its millions of tech graduates, India has only developed a fraction of home grown tech products with international reach. India is also lagging far behind China (similar developing country with many tech graduates) in AI research. Makes us outsiders wonder if India is really tech-competent or just diploma mill competent when it comes to true tech innovations and products.
rickroll - china is not similar to india, they are way ahead, in every department, dont compare yourself to china
 
rickroll - china is not similar to india, they are way ahead, in every department, dont compare yourself to china

Correct.

China is 4-5 times ahead of India in terms of economy, military strength, and regional influence. No comparison whatsoever. :inti

China is a genuine superpower. Something India can only dream.
 
British Pakistanis: Indians you can’t compare yourself to China, when no Indian is doing that and yet the narrative ..
 
rickroll - china is not similar to india, they are way ahead, in every department, dont compare yourself to china
I understand that English is not your first language since I mentioned this before. I'm not an Indian but a proud Pakistani American and a proud Muslim.
 
Indians and their agents are trying to derail this thread. Let's return to topic. :inti

====================================

Gujarat techies run fake call center, dupe 80 foreigners of Rs 30 lakh​

A sophisticated international call centre scam was busted in Vadodara, Gujarat, involving three young men who duped over 80 foreigners. The operation used forged documents and aggressive tactics to swindle nearly Rs 30 lakh from victims in the US and UK.​


A late-night raid on a quiet bungalow in Gujarat's Vadodara has exposed a full-fledged international call centre racket run by three young men who allegedly conned more than 80 foreigners by posing as representatives of a US-based lending firm.

Police said the trio used polished English, forged loan documents and aggressive persuasion tactics to extract nearly 30 lakh from victims in the United States and the United Kingdom.

ENGINEERS BEHIND THE FRAUD​

Investigators said two of the accused, Rawat and Ansh Panchal, are trained engineers, one in electronics and the other holding a diploma in mechanical engineering. Their technical background and fluent English helped them run the operation with a degree of sophistication, police added.

The third accused, Sneh Patel, allegedly assisted in sourcing data and coordinating calls.

The trio posed as employees of a fictitious firm named Prosper Funding, sending out fabricated approval letters for prepaid or soft loans. Victims were told their loans had been sanctioned but would only be released after paying a 20% “commission” upfront.

Many transferred the money believing they were dealing with a legitimate financial institution.

TWO-MONTH OPERATION, Rs 30 LAKH SIPHONED​

Officers said the call centre had been active for only two months yet had managed to defraud more than 80 foreigners. The estimated loss stands at Rs 30 lakh, though police believe the figure may rise once bank statements and digital traces are fully analysed.

Six mobile phones and several laptops have been seized. Forensic experts will examine device logs, VoIP applications, chat histories and transaction trails to piece together the network’s reach and determine who received the proceeds.

DATA BUYING-AND-SELLING NETWORK UNCOVERED​

The raid also uncovered another layer of the racket, an organised marketplace for foreign customer data.

According to police, the accused bought personal data, including names, phone numbers and addresses of potential customers abroad, from Telegram channels for Rs 80 per entry.

They then resold this data to call centres in major cities such as Delhi, Kolkata, Mumbai and Bengaluru for Rs 100 per entry. Using this information, they contacted foreigners and extorted dollars through deception, false promises and intimidation.

PROBE WIDENS​

Police teams are now examining money flow patterns and identifying possible associates in other cities.

Investigators said the financial trail, which spans multiple bank accounts, will be crucial in establishing whether the Vadodara group was part of a larger interstate or international syndicate.

More arrests are likely as the probe continues.

Source: https://www.indiatoday.in/india/sto...rs-in-rs-30-lakh-loan-scam-2824474-2025-11-22.
 
I understand that English is not your first language since I mentioned this before. I'm not an Indian but a proud Pakistani American and a proud Muslim.
how is english not my first language because you said so = really ,yet your calling ppl dumb, look in the mirror
 
#DataViz: How India’s Cyber Crime Incidence Is Rising

www.indiaspend.com
#DataViz: How India’s Cyber Crime Incidence Is Rising
Complaints rose fivefold since 2021, and digital payment and ‘digital arrest’ scams surged
www.indiaspend.com www.indiaspend.com


Complaints rose fivefold since 2021, and digital payment and ‘digital arrest’ scams surged

Pune: India’s rising access to mobile phones and the internet is accompanied by an increase in cyber crime reporting, our analysis of government data shows.

The National Cyber Crime Reporting Portal (NCRP), under the Ministry of Home Affairs, was set up in 2019 to help citizens in filing cyber crime complaints. Incidents reported on the portal increased from 452,000 in 2021 to 2.3 million in 2026, according to data shared by the government in the Rajya Sabha. The portal categorises cyber crime into three broad categories: Women/children-related crime, financial fraud, and other cyber crime.


Financial sector data indicate a parallel rise in online payment frauds: Frauds of Rs 1 lakh and above increased to 29,082 cases in 2023-24, involving Rs 1,457 crore, according to the Reserve Bank of India (RBI). Reports of digital arrest scams also rose, touching 123,672 incidents in 2024.

The National Crime Records Bureau (NCRB) collates data from state bureaus, which reflect the number of cases registered. Between 2018 and 2023, the year for which latest data are available, cases of cyber crime more than tripled. This increasing incidence could be due to multiple factors including more reporting and easier registration, and does not necessarily reflect a simple increase.

This week, the Union government issued two notifications on mobile phones—mandating the Sanchar Saathi app to be pre-installed, and requiring SIM binding—aimed at tracking lost phones and curbing cyber crime. After widespread privacy concerns, the government made the use of the app voluntary.

A 2024 study found that psychological manipulation is central to how cyber fraudsters deceive victims. It noted that scammers commonly use tactics such as creating false trust, creating urgency or fear, making emotional appeals, imitating authority figures, and offering small incentives or quick financial gains to push people into sharing sensitive information.

Limited digital and media literacy leaves many users more vulnerable to online frauds and misinformation, IndiaSpend reported in 2023. Experts argue that media and information literacy should be part of school education to help people navigate digital risks safely.

In four charts, we track the state of cyber crime in India.


Five-fold increase in digital complaints

Cyber crime incidents reported on the NCRP increased every year from 2021 to 2024. By 2024, incident reports had climbed to 2.27 million, nearly five times the 2021 level. In 2025, up to June 30, the portal had already logged 1.25 million incidents.

Maharashtra recorded the highest volume of complaints with about 303,000 in 2024, followed by Uttar Pradesh (301,000), Karnataka (169,000), Gujarat (168,000) and Delhi (153,000).

Rise in registered cyber crimes

While India reported fewer than 10,000 cyber offences annually before 2014, the trend shifted in 2017, when cases rose 77% over 2016, NCRB data show. Since 2018, as we said, cases registered more than tripled to 86,420 in 2023.

RBI Reports an Increase in Digital Payment Frauds

Frauds involving card, internet and other digital payments of Rs 1 lakh and above increased 11 times and the money involved rose 12 times since 2020-21, according to data from the Reserve Bank of India.

"If an online fraud takes place, the first step should be to register a complaint on the cyber portal immediately. This needs to be done as soon as the fraud occurs,” Vaibhav Salunkhe, a Pune-based cyber law expert, told IndiaSpend, “After that, the victim should inform the concerned bank, and if a third-party payment app is involved, a complaint must be filed there as well."

The sooner the victim reports the fraud, the better the chances of blocking the transaction, he said. Salunkhe has 20 years of experience in practicing cyber law and dealing with economic offences.

However, recoveries did not keep pace. The NCRP portal shows that since its inception, Indians reported 3.8 million cyber fraud incidents with a total reported loss of Rs 36,448 crore as of February 28, 2025. Of this, Rs 4,381 crore was placed under lien, but only Rs 60.52 crore had been returned to affected users.

Salunkhe points to a shortage of personnel trained to deal with cyber or digital fraud matters, both in the police and in the judiciary. “As the number of such cases continues to rise, there is a need for more specialised staff with the skills required to handle these investigations effectively,” he added.


Digital arrest fraud rising

Another type of scam being perpetrated in recent times is called the ‘digital arrest’ scam, where fraudsters posing as law enforcement officers “arrest” or “detain” unsuspecting people, strictly monitoring their movements on video—sometimes for days on end. This usually ends with the fraudsters asking for “bail money” or “penalty”, which in many cases is people’s entire life savings.

Digital arrest scams saw the fastest increase among all categories on the NCRP. Incidents rose from 39,925 in 2022 to 123,672 in 2024. Reported losses grew from about Rs 91 crore in 2022 to Rs 1,935 crore in 2024.

Cyber law specialist Jayesh Bhandekar said digital arrest scams also exploit gaps in legal awareness. “It is important to understand that there is no concept of a ‘digital arrest’ in Indian law,” Bhandekar, partner at Cyber Experts S&B Associates, Pune, told IndiaSpend. “Every arrest requires a warrant, and in most cases it is executed in person. If authorities need to arrest someone, there is a due legal process that must be followed.”

In March this year, the government told the Rajya Sabha that the Citizen Financial Cyber Fraud Reporting and Management System under the I4C portal, launched in 2021, has helped save over Rs 4,386 crore from 1.4 million complaints. It also said the 1930 helpline is operational for quick reporting of online frauds and that nationwide awareness campaigns on digital arrest scams have been launched.

A study related to digital arrest scams found that police and cyber cells face key operational challenges, including limited technical training, inadequate cyber-forensic infrastructure and delayed response times. It also highlighted a wider gap in digital literacy, noting that many people, especially in rural or less digitally aware regions, lack basic online fraud-prevention knowledge, making them more vulnerable to such scams.
 
how is english not my first language because you said so = really ,yet your calling ppl dumb, look in the mirror
Because you do not seem to read the content of my posts and label anyone who does not agree with your flawed logic as Indian.
 
Because you do not seem to read the content of my posts and label anyone who does not agree with your flawed logic as Indian.
thats hanst occured .... you indians keep lying, and its not me who just says this, ask people like kingkhan, bouncerguy sweep-shot,patriot, cpt rishwan etc


if you can't comprehend topics, then stay away from them
 
thats hanst occured .... you indians keep lying, and its not me who just says this, ask people like kingkhan, bouncerguy sweep-shot,patriot, cpt rishwan etc


if you can't comprehend topics, then stay away from them
Yep, thank you for proving my point with "you Indians" to a non-Indian, spelling mistakes, grammar mistakes and logical mistakes. Like I said before please learn to type proper English and learn something outside of your Chittagong PIND education. You are as bad as an Indian troll as far as most of us Pakistanis here are concerned.
 

How Cybercriminals Target You: Real Cases, Data & Expert Warnings | Cyber Crime​





Look what i found, helpful advise, so you lot know what helpline to call - when a indian tries to scam call you
 

200 Scammers ARRESTED Live On Camera!​




What a achievement by him and his team

what have you reported to stop this from occuring - you sat on you behind and ddidnt report anything didnt you
@Rajdeep @cricketjoshila @Champ_Pal @JaDed @Devadwal @uppercut @Theanonymousone @straighttalk @Vikram1989 @RexRex @Varun @Romali_rotti @Bhaijaan @rickroll @Cover Drive Six



@sweep_shot above video fOR YOU


STAY SAFE PEOPLE, ESPECIALLY FROM THE INDIAN SCAM CALL CENTRES

How can these people sleep at night knowing they loot Billions from innocents on a regular basis? :inti

Good that they got arrested. I hope they will not be released.
 

Duped of millions in 'digital arrest', Indian woman seeks answers from banks​



Anjali's* nightmare began with a phone call that would cost her 58.5m rupees ($663,390; £488,792).

The caller claimed to be from a courier company, alleging that Mumbai customs had seized a drug parcel she was sending to Beijing.

Anjali, a resident of Gurugram, a suburb of Indian capital Delhi, fell prey to a "digital arrest" scam - fraudsters posing as law enforcement officials on video calls and threatening her with life in prison and harm to her son unless she obeyed.

Over five harrowing days last September, they kept her under 24/7 surveillance on Skype, terrified her with threats, and coerced her into liquidating her savings and transferring the money.

"After that, my brain stopped working. My mind shut down," she says.

By the time the calls stopped, Anjali was broken - her confidence shattered, her fortune gone.

Her case is far from unique.

Government data , externalshows Indians lost millions of dollars to "digital arrests," with reported cases nearly tripling to 123,000 between 2022 and 2024.

The scam has grown so rampant that the government has resorted to full-page ads, radio and TV campaigns, and even a prime ministerial warning. Officials say they have blocked nearly 4,000 Skype IDs and over 83,000 WhatsApp accounts linked to the fraud.

Anjali has spent the past year shuttling between police stations and courts, tracing the trail of her vanished money and petitioning authorities - including the prime minister - for help.

Victims say soaring scams, weak bank safeguards, and poor recovery expose regulatory gaps in a country where digital banking has outpaced cybercrime checks, ensnaring people across classes.

Anjali says tracing her money trail exposed failures at every level of India's top banks.

She told the BBC she rushed to her HDFC Bank branch - India's largest private lender - on 4 September 2024, panicked and under video surveillance by scammers, transferring 28m rupees that day and another 30m the next.

She alleges that the bank failed to detect red flags or trigger alerts for abnormal transactions, even though the amounts she was transferring were 200 times larger than her usual pattern of withdrawals.

She wonders why her premium account drew no call from her relationship manager and why the bank failed to flag such massive debits.

"Should the size of transfers that I made all in a matter of under three days not have been enough to raise suspicion and even prevent the crime?" Anjali asks, noting that if credit card spends of 50,000 rupees trigger verification calls, why not multi-million withdrawals from savings accounts.

In an email to Anjali, which the BBC has seen, HDFC called her allegations "baseless" and said the incident of fraud was reported to the bank after a delay of two-three days. It added that the transactions were authorised by the bank on her instructions so its officials cannot be faulted.

India's banking ombudsman closed her complaint against HDFC, citing a 2017 rule that makes customers like Anjali bear the full loss if the fraud is deemed their mistake.

HDFC Bank did not respond to the BBC's questions.

When we met Anjali, she showed us a huge chart she had compiled of how her money travelled from one bank to another.

It showed the funds first went from HDFC into an account held by "Mr Piyush" in ICICI Bank, also one of India's largest private lenders.

A police investigation into the money trail revealed that Mr Piyush's account barely had a balance of few thousand rupees before the transfer.

Anjali questions why ICICI permitted multiple fund transfers into the account "when such sudden large deposits should ideally have triggered automated transaction monitoring systems under any bank's anti-money-laundering obligations".

She also wonders how the bank allowed a quick outflow of the money from Mr Piyush's account without temporarily freezing it or doing additional Know Your Customer (KYC) verification.

While ICICI has lodged a complaint against Mr Piyush - who was briefly arrested and then freed on bail - Anjali says a delay in freezing his account proved very expensive for her.

In a statement to the BBC, ICICI said they had followed all "prescribed know your client" procedures while opening the account and until the disputed transactions, it had exhibited no suspicious activity. It said "any insinuation that the bank failed in its due-diligence is entirely unfounded".

The bank said it froze the account immediately after Anjali's complaint and helped her file a police case and trace the mule account-holder.

The ombudsman has also closed her complaint against ICICI saying the bank had followed KYC rules when opening Mr Piyush's account, and that it couldn't have predicted that it would be used for what it described were fraudulent activities.

Police found that within four minutes of reaching ICICI, most of her money was funneled into 11 accounts at Sree Padmavathi Cooperative Bank, an affiliate of Federal Bank in Hyderabad city.

They found that addresses of eight of the 11 were fictitious and the account holders couldn't be traced.

Their KYC documents were also not available with the bank. The remaining three account holders were a rickshaw driver, a widow doing tailoring work in a small shanty town and a carpenter.

Police found that except for one, the account holders were unaware of the large sums flowing through their accounts.

In May, police arrested former director of the cooperative bank Samudrala Venkateshwaralu - he remains in prison, with the court rejecting his bail petition three times "considering the gravity and far reaching impact of cyber frauds".

The police report alleges that many of these accounts were opened at the behest of Venkateshwaralu and were essentially mule accounts - which are opened in other people's names but sold to criminals who operate them to launder money.

Neither Federal Bank nor Sree Padmavathi Bank responded to the BBC's detailed questionnaire.

Over a year after losing her money, Anjali and others petitioned India's top consumer court in January, which admitted their complaint of "deficiency of services" by banks. The banks must respond, with a hearing due in November.

As such scams get more complex, there are growing discussions , externalworldwide around who ultimately pays for financial fraud - and what responsibility banks, financial institutions and regulators bear.

Last October the UK tightened rules, external around the liability of payment service providers, requiring them to reimburse customers, barring exceptions who fall victim to some types of financial fraud.

"Banks have a duty of care towards customers. If a bank observes any activity in an account that is inconsistent with its overall transaction patterns, it must stop that transaction," Mahendra Limaye, a lawyer who is fighting cases of a dozen digital arrest victims including Anjali's, told the BBC.

He accuses the banks of indirectly "abetting the financial suicide" of the complainants by opening money mule accounts, failing in their duty to do continuous due diligence of customers and in their duty to preserve and protect their money.

But so far, relief has proved elusive for Anjali - she has managed to recover barely 10m of 58m rupees she lost to the fraud. And Mr Limaye says it's likely to be a protracted battle ahead.

To add salt to her wounds, Anjali says, she is being forced to pay taxes on the money stolen from her.

Investments redeemed are taxed on capital gains, even when they are lost to fraudsters. She is now pleading for exemption from such taxation.

"As of now, there is no recognition of such crimes by the Income Tax department, This compounds the victims' financial misery," she says.

*The victim's real name has been changed to protect her identity.





Constant scams going on in India is alarming
 

CBI charge sheet names 17 persons, 58 firms for cyberfraud​



Bank accounts of shell entities used to allegedly route over ₹1,000 crore, with one account alone receiving funds exceeding ₹152 crore within a short span

The Central Bureau of Investigation (CBI) has filed a charge sheet against 17 accused individuals, including four Chinese nationals, and 58 companies, after unearthing a large and well-organised transnational cyber fraud network operating across multiple States in India.
to Credit: PTI
The Central Bureau of Investigation (CBI) has filed a charge sheet against 17 accused individuals, including four Chinese nationals, and 58 companies, after unearthing a large and well-organised transnational cyber fraud network operating across multiple States in India.


The agency has identified the foreign handlers as Zou Yi, Huan Liu, Weijian Liu, and Guanhua Wang, at whose instance shell companies were incorporated in India from 2020 onwards.
 
Fake Viagra, Cialis sold to Americans, Mumbai crime branch busts International Pharma call centre scam:




Constant scams coming out from India - then they say india is the pharmacy of the world = yeh in illegal drugs
 
Fake Viagra, Cialis sold to Americans, Mumbai crime branch busts International Pharma call centre scam:




Constant scams coming out from India - then they say india is the pharmacy of the world = yeh in illegal drugs

I run when I see "Made in India". :inti

Quality was never their strength.
 
Epi-center of hunger, poverty, scammers, r*pist, and terrorist genocide supporters. What a d*ung of a place.

When you hear a thick Indian accent clsiming his name is Tom's Harry Dick from Texas... You just hangup
 

Rs 3,000 Crore Fraud Uncovers Haryana-Madhya Pradesh Cyber Crime Corridor​



Most of the fraudsters were school dropouts in their early twenties, running a highly efficient digital empire from a flat in Gurugram, where an illegal call centre functioned as the control room for pan-India cyber crimes.

Rs 3,000 Crore Fraud Uncovers Haryana-Madhya Pradesh Cyber Crime Corridor​

Most of the fraudsters were school dropouts in their early twenties, running a highly efficient digital empire from a flat in Gurugram, where an illegal call centre functioned as the control room for pan-India cyber crimes.​

  • Reported by:Anurag Dwary
  • India News
  • Dec 09, 2025 21:09 pm IST
    • Published OnDec 09, 2025 21:09 pm IST
    • Last Updated OnDec 09, 2025 21:09 pm IST
Read Time:7 mins
Share
  • Twitter
  • WhatsApp
  • Facebook
  • Reddit
  • Email


Rs 3,000 Crore Fraud Uncovers Haryana-Madhya Pradesh Cyber Crime Corridor

Over 1,000 mule bank accounts were exploited to channel fraud money
A disturbing network of crime, fraud, and potential terror financing is emerging at the intersection of the Nuh district in Haryana and Madhya Pradesh. The district of Nuh, located in southeastern Haryana, has long struggled with unemployment, porous policing structures, and socio-economic deprivation. But over the last few years, it has transformed into the country's most dangerous cyber crime hotspot, a successor to Jamtara, with far more reach, sophistication, and risk.

The Madhya Pradesh police earlier this year uncovered the state's biggest-ever cyber crime racket, worth more than Rs 3,000 crore. As the probe deepened, it became clear that the masterminds of the operation were not from Madhya Pradesh – they were operating from Nuh. Most of them were school dropouts in their early twenties, yet they ran a highly efficient digital empire from a flat in Gurugram, where an illegal call centre functioned as the control room for pan-India cyber crimes. Fraud calls related to job scams, investment schemes, cryptocurrency trading and fake law enforcement threats were made from this apartment every day.

Haryana-Madhya Pradesh Cyber Crime Nexus

What makes the case more alarming is its connection to Madhya Pradesh. Over 1,000 mule bank accounts, mostly belonging to poor villagers from the Vindhya and Mahakoshal regions, were exploited to channel fraud money. These account holders were told that they would receive benefits from government schemes, but instead their accounts became conduits for laundering crores.

Latest and Breaking News on NDTV

In less than two years, more than Rs 3,000 crore moved across these accounts in a complex pattern, routed to cities across India and, in many cases, further transferred abroad. Investigators have confirmed that significant amounts eventually reached the Middle East. Whether these transfers were purely related to cyber fraud or tied to something more sinister, like religious funding, hawala networks, or terror financing, remains part of an ongoing and highly sensitive inquiry.

Alongside these mule accounts, hundreds of SIM cards were procured from Madhya Pradesh through a second set of operatives. The SIM cards moved from Madhya Pradesh to Patna, where middlemen packaged and transported them to the masterminds in Nuh. These SIMs became the backbone of the cyber crime calls made to thousands of Indians. The Nuh operators also controlled shell companies in Hyderabad and parts of Maharashtra, through which illicit funds were circulated to mask their origins. Every layer of the racket, whether recruitment, SIM sourcing, mule account management or fund routing, ultimately linked back to Nuh.

SP Pranay Nagwanshi, who heads Madhya Pradesh's Cyber Cell, recalls the moment the scale began to reveal itself. "A large number of fake SIM cards were being sold in Jabalpur, Katni, Rewa, Sidhi, Satna and surrounding areas," he said.

"When we launched an operation last month, we discovered new centres in Damoh, Dindori, Shivpuri, Gwalior and even around Indore," he added.

Madhya Pradesh - A Supply Base

The picture was clear: Madhya Pradesh was being hollowed out from within, used as a raw-material supplier for one of the country's largest criminal networks.

The complicity extended deeper than local agents.

"In some cases, bank employees were involved in opening accounts. Many mule accounts were opened through their references. We have taken action against them too," Nagwanshi said.

Latest and Breaking News on NDTV

Villagers who barely understood digital systems found their names tied to transactions worth crores. Their accounts were often rented out for as little as Rs 5,000 a month.

"Sometimes the rent went up to Rs 10,000 if people realised their accounts were being misused," Nagwanshi explained, adding, "But the amounts were never high enough to call them part of the nexus. They were simply exploited for commission."

The consequences have been devastating. The state is witnessing an unprecedented surge in cyber crime.

Cases Of Cyber Fraud

In Indore, a retired medical officer was kept under "digital arrest" for a month, threatened by callers posing as Telecom Regulatory Authority of India (TRAI) officials and even a Supreme Court judge. Terrified, the man transferred Rs 4.32 crore - his entire life's savings - to accounts controlled by the fraudsters.

In Bhopal, a 67-year-old retired bank manager and his wife were terrorised by criminals impersonating police officers, who claimed their bank accounts had funded terrorists involved in the Delhi bomb blasts. The couple was locked inside their home for 24 hours on the criminals' instructions, during which the fraudsters syphoned off Rs 67 lakh.

Another chilling case emerged in Katni, where a doctor was threatened by someone posing as an NIA officer, who claimed the doctor was linked to the Red Fort bombing case. The fraud was stopped only when the victim's son recognised the trap and alerted cyber police.

Police acknowledged how national tragedies become tools for criminals. "Since the Delhi bombings and the Jammu and Kashmir incident, threats of this nature have surged," Nagwanshi said.

"Cybercriminals exploit every new development. They weaponise fear instantly, using it to intimidate and extort people," he added.

Latest and Breaking News on NDTV

Shell Companies

What investigators found next shook them even further. In one portion of the network, thousands of crores had moved through a cluster of mule accounts opening into shell companies across Hyderabad and Maharashtra.

"A key finding was that many of these accounts were used to open shell companies, and large amounts of money were being transferred or deposited in the name of these companies," Nagwanshi said.

The human cost reached a tragic peak when a 68-year-old senior advocate, Shivkumar Verma, died by suicide in Bhopal after receiving a call claiming that a fake bank account opened in his name was being used to fund terrorists in Pahalgam. In his final note, he wrote that he could not bear the stigma of being called a traitor. His death exposed the horrifying psychological violence of cyber crime.

According to figures tabled in the Madhya Pradesh Assembly, the situation is spiralling. From May 2021 to July 2025, over Rs 1,054 crore was stolen from residents of Madhya Pradesh through cyber fraud, while the police have recovered less than one per cent - Rs 19.4 million.

Additionally, more than four lakh cyber-crime complaints were filed each year from 2020 to 2022. Out of 13 cases registered during this period, only 585 cases reached the chargesheet stage, while hundreds remain pending.

Current Status

MLA Jaivardhan Singh, who raised the matter in the Assembly, said the figures reflect a disturbing lack of readiness.

"This is extremely serious," he said, adding, "Over one thousand crore rupees were stolen from Madhya Pradesh, and the recovery is negligible. The police neither have the resources nor the seriousness to tackle cyber fraud."

Amid this chaos, the state's cyber cell has already arrested over 25 individuals connected to the interstate cyber network. All have been charge sheeted. However, the police believe they have only scratched the surface. The real masterminds, who controlled every thread of the web, are still in Nuh.

Cyber crime police acknowledged that Nuh, along with adjoining parts of Rajasthan, has now become India's leading cyber crime hotbed, surpassing older centres like Jamtara.

He emphasised that years of crackdowns in Jharkhand and West Bengal pushed cybercrime networks to migrate into newer geographies, particularly Nuh, with its combination of mobility, anonymity and criminal networks.

As Madhya Pradesh grapples with this digital onslaught, a larger question looms over national security agencies. If money from the mule accounts was routed to foreign destinations, if the same networks appear in both cyber fraud and terror financing investigations, and if Nuh serves as a common intersection for extremist modules and financial crime, then is India now witnessing the evolution of a cyber-terror corridor?



These cyber scams dont ever....well nevermind stop, but at least reduce these, fellow indians what do you think:


@Rajdeep @cricketjoshila @Champ_Pal @JaDed @Devadwal @uppercut @Theanonymousone @straighttalk @Vikram1989 @RexRex @Varun @Romali_rotti @Bhaijaan @Cover Drive Six
 
All these cyber scams from India are supported by local and national authorities.

With the INR heading into the dumps, India's clout near zero, economy in the doldrums, millions wanting to leave - the only way to prop up the country's economy is by stealing it.
 
Hyderabad: Police SI Loses Rs 39.3 Lakh in WhatsApp Trading Scam


The fraudsters continued to persuade him by displaying manipulated profit figures on the application. Trusting these claims, the victim made multiple transfers over time, sending a total of Rs 39,37,247 through fourteen transactions.

Hyderabad: A police inspector filed a complaint with the Rachakonda cybercrime police after losing Rs 39.37 lakh in an investment scam. According to police sources, the victim, from the Malkajgiri zone, was duped after a family member using the complainant’s mobile phone was lured by conmen. The family member was allegedly enticed to invest in concert tickets. On November 24, the victim was introduced to an online trading service through a WhatsApp group titled Special Training Program: Deva A Team 13, which had 98 members. The group shared a registration link claiming to be for a trading platform called the MAVERICKS Trading App.

The administrators regularly posted screenshots showing huge profits and success stories. Impressed by the purported returns, the victim initially invested Rs 50,000 and was later encouraged to invest additional amounts ranging from Rs 3 lakh to Rs 5 lakh. The fraudsters continued to persuade him by displaying manipulated profit figures on the application. Trusting these claims, the victim made multiple transfers over time, sending a total of Rs 39,37,247 through fourteen transactions.

However, when he attempted to withdraw his money and the displayed profits, the application offered no withdrawal option. His repeated attempts to contact the group administrators failed, and once they stopped responding to calls and messages, he realised he had been scammed. The family member then informed the complainant, who is also an Inspector. Using the mobile phone and bank account belonging to the Inspector, the fraudsters had executed the transactions. The Inspector subsequently filed a complaint with the Cybercrime police, and a case has been registered.
 
Hyderabad: Police SI Loses Rs 39.3 Lakh in WhatsApp Trading Scam


The fraudsters continued to persuade him by displaying manipulated profit figures on the application. Trusting these claims, the victim made multiple transfers over time, sending a total of Rs 39,37,247 through fourteen transactions.

Hyderabad: A police inspector filed a complaint with the Rachakonda cybercrime police after losing Rs 39.37 lakh in an investment scam. According to police sources, the victim, from the Malkajgiri zone, was duped after a family member using the complainant’s mobile phone was lured by conmen. The family member was allegedly enticed to invest in concert tickets. On November 24, the victim was introduced to an online trading service through a WhatsApp group titled Special Training Program: Deva A Team 13, which had 98 members. The group shared a registration link claiming to be for a trading platform called the MAVERICKS Trading App.

The administrators regularly posted screenshots showing huge profits and success stories. Impressed by the purported returns, the victim initially invested Rs 50,000 and was later encouraged to invest additional amounts ranging from Rs 3 lakh to Rs 5 lakh. The fraudsters continued to persuade him by displaying manipulated profit figures on the application. Trusting these claims, the victim made multiple transfers over time, sending a total of Rs 39,37,247 through fourteen transactions.

However, when he attempted to withdraw his money and the displayed profits, the application offered no withdrawal option. His repeated attempts to contact the group administrators failed, and once they stopped responding to calls and messages, he realised he had been scammed. The family member then informed the complainant, who is also an Inspector. Using the mobile phone and bank account belonging to the Inspector, the fraudsters had executed the transactions. The Inspector subsequently filed a complaint with the Cybercrime police, and a case has been registered.

Scamming a police officer. Wow!

They have no red lines I guess.
 
All these cyber scams from India are supported by local and national authorities.

With the INR heading into the dumps, India's clout near zero, economy in the doldrums, millions wanting to leave - the only way to prop up the country's economy is by stealing it.

Yup. That's what it seems like.

Indian government probably don't want to solve this as it boosts India's GDP.

I wouldn't be surprised if a significant percentage of India's GDP comes from scammers/fraudsters. :inti
 

T.N. police warn public about new cyber scam involving USSD codes​




Criminals impersonate courier or delivery service agents to fraudulently access citizens’ bank accounts and social media profiles

The Cyber Crime Wing of the Tamil Nadu Police has issued a public advisory regarding a new and emerging cyber fraud, where criminals impersonate courier or delivery service agents to fraudulently access citizens’ bank accounts and social media profiles.
 
Retired Teacher In Tirupati Loses ₹40 Lakh To Cyber Fraudsters




the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered: Police

NELLORE: A 66-year-old retired teacher in Tirupati lost ͅ₹40 lakh to cyber fraudsters posing as CBI officials, before the bank’s staff stepped in and stopped further transactions, police said on Wednesday. The incident took place within the limits of the SVU Campus police station. According to the police, the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered.

Under the pretext of a “priority investigation”, the gang demanded his bank account details and insisted that money had to be deposited to prove his innocence. Believing in their claims, the victim transferred ₹40 lakh to different bank accounts provided by the fraudsters. When the accused demanded more money, the victim approached the ISKCON branch of the SBI in Tirupati to make another transfer through RTGS. Bank officials grew suspicious after noticing the large amount being transferred to accounts in other states.


Sensing a possible cyber fraud, they immediately stopped the transaction and advised the victim to contact the cybercrime police. Following a complaint, further losses were prevented due to the alertness of the bank staff, police said. SP, Subba Rayudu, warned that agencies such as the CBI, police or courts never conduct inquiries through WhatsApp video calls. “Digital arrest” has no legal basis. He advised the public not to share OTPs, bank details or personal information to strangers, and to report such incidents to the 1930 cybercrime helpline or at www.cybercrime.gov.in.


https://www.deccanchronicle.com/sou...ati-loses-40-lakh-to-cyber-fraudsters-1924587

Now targetting teachers, tbg fair teacher shouldn't be teaching, not educated enough

@Rajdeep @cricketjoshila @Champ_Pal @JaDed @Devadwal @uppercut @Theanonymousone @straighttalk @Vikram1989 @RexRex @Varun @Romali_rotti @Bhaijaan @Cover Drive Six @rickroll @rpant_gabba, @Romali_rotti
 
Retired Teacher In Tirupati Loses ₹40 Lakh To Cyber Fraudsters




the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered: Police

NELLORE: A 66-year-old retired teacher in Tirupati lost ͅ₹40 lakh to cyber fraudsters posing as CBI officials, before the bank’s staff stepped in and stopped further transactions, police said on Wednesday. The incident took place within the limits of the SVU Campus police station. According to the police, the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered.

Under the pretext of a “priority investigation”, the gang demanded his bank account details and insisted that money had to be deposited to prove his innocence. Believing in their claims, the victim transferred ₹40 lakh to different bank accounts provided by the fraudsters. When the accused demanded more money, the victim approached the ISKCON branch of the SBI in Tirupati to make another transfer through RTGS. Bank officials grew suspicious after noticing the large amount being transferred to accounts in other states.


Sensing a possible cyber fraud, they immediately stopped the transaction and advised the victim to contact the cybercrime police. Following a complaint, further losses were prevented due to the alertness of the bank staff, police said. SP, Subba Rayudu, warned that agencies such as the CBI, police or courts never conduct inquiries through WhatsApp video calls. “Digital arrest” has no legal basis. He advised the public not to share OTPs, bank details or personal information to strangers, and to report such incidents to the 1930 cybercrime helpline or at www.cybercrime.gov.in.


https://www.deccanchronicle.com/sou...ati-loses-40-lakh-to-cyber-fraudsters-1924587

Now targetting teachers, tbg fair teacher shouldn't be teaching, not educated enough

@Rajdeep @cricketjoshila @Champ_Pal @JaDed @Devadwal @uppercut @Theanonymousone @straighttalk @Vikram1989 @RexRex @Varun @Romali_rotti @Bhaijaan @Cover Drive Six @rickroll @rpant_gabba, @Romali_rotti

I never sanghis condemn these. They are severely lacking in self-accountability.

A normal human being praises the good and condemns the bad. I guess sanghis do not fall under the normal category. :inti
 
Retired Teacher In Tirupati Loses ₹40 Lakh To Cyber Fraudsters





the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered: Police

NELLORE: A 66-year-old retired teacher in Tirupati lost ͅ₹40 lakh to cyber fraudsters posing as CBI officials, before the bank’s staff stepped in and stopped further transactions, police said on Wednesday. The incident took place within the limits of the SVU Campus police station. According to the police, the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered.


The caller warned the victim of legal action and asked him to immediately report to the Bengaluru CBI office. This created in him fear and mental stress. The fraudsters later contacted the victim through WhatsApp video calls and instructed him to keep the matter a secret, and not inform anyone at home. He was told to stay alone in a locked room, send regular confirmation messages and follow their instructions.

Under the pretext of a “priority investigation”, the gang demanded his bank account details and insisted that money had to be deposited to prove his innocence. Believing in their claims, the victim transferred ₹40 lakh to different bank accounts provided by the fraudsters. When the accused demanded more money, the victim approached the ISKCON branch of the SBI in Tirupati to make another transfer through RTGS. Bank officials grew suspicious after noticing the large amount being transferred to accounts in other states.

Sensing a possible cyber fraud, they immediately stopped the transaction and advised the victim to contact the cybercrime police. Following a complaint, further losses were prevented due to the alertness of the bank staff, police said. SP, Subba Rayudu, warned that agencies such as the CBI, police or courts never conduct inquiries through WhatsApp video calls. “Digital arrest” has no legal basis. He advised the public not to share OTPs, bank details or personal information to strangers, and to report such incidents to the 1930 cybercrime helpline or at www.cybercrime.gov.in.
 
Retired Teacher In Tirupati Loses ₹40 Lakh To Cyber Fraudsters





the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered: Police

NELLORE: A 66-year-old retired teacher in Tirupati lost ͅ₹40 lakh to cyber fraudsters posing as CBI officials, before the bank’s staff stepped in and stopped further transactions, police said on Wednesday. The incident took place within the limits of the SVU Campus police station. According to the police, the victim received a phone call from an unknown person claiming to be a CBI officer. The caller alleged that obscene messages had been sent from the victim’s mobile number to some women in Bengaluru. He claimed that an FIR had been registered.


The caller warned the victim of legal action and asked him to immediately report to the Bengaluru CBI office. This created in him fear and mental stress. The fraudsters later contacted the victim through WhatsApp video calls and instructed him to keep the matter a secret, and not inform anyone at home. He was told to stay alone in a locked room, send regular confirmation messages and follow their instructions.

Under the pretext of a “priority investigation”, the gang demanded his bank account details and insisted that money had to be deposited to prove his innocence. Believing in their claims, the victim transferred ₹40 lakh to different bank accounts provided by the fraudsters. When the accused demanded more money, the victim approached the ISKCON branch of the SBI in Tirupati to make another transfer through RTGS. Bank officials grew suspicious after noticing the large amount being transferred to accounts in other states.

Sensing a possible cyber fraud, they immediately stopped the transaction and advised the victim to contact the cybercrime police. Following a complaint, further losses were prevented due to the alertness of the bank staff, police said. SP, Subba Rayudu, warned that agencies such as the CBI, police or courts never conduct inquiries through WhatsApp video calls. “Digital arrest” has no legal basis. He advised the public not to share OTPs, bank details or personal information to strangers, and to report such incidents to the 1930 cybercrime helpline or at www.cybercrime.gov.in.

They have no conscious. Stealing from retired/senior people.

Even animals have more humanity than these greedy monsters. :inti
 

CBI Files Chargesheet Against 17, Including 4 Chinese Nationals, 58 Companies In Transnational Cyber Fraud Case​





According to the probe agency's final report, the group layered the flow of illicit funds through 111 shell companies, routing about Rs 1,000 crore via mule accounts. One account received more than Rs 152 crore in a short span, it said.

New Delhi: The Central Bureau of Investigation (CBI) has filed a chargesheet against 17 accused persons, including four Chinese nationals and 58 companies, for their alleged roles in a transnational cyber fraud network that siphoned off over Rs 1,000 crore through a sprawling web of shell entities and digital scams, officials said on Sunday.
After busting the racket in October 2025, investigators unravelled a single, tightly coordinated syndicate that relied on an elaborate digital and financial infrastructure to run a range of frauds. These included misleading loan applications, fake investment schemes, Ponzi and multi-level marketing models, bogus part-time job offers and fraudulent online gaming platforms.
According to the probe agency's final report, the group layered the flow of illicit funds through 111 shell companies, routing about Rs 1,000 crore via mule accounts. One account received more than Rs 152 crore in a short span, it said.

In October 2025, the three main Indian associates had been arrested. The investigation has revealed that a single coordinated syndicate created an extensive digital and financial infrastructure to defraud thousands of unsuspecting citizens through misleading loan apps, fake investment schemes, Ponzi and MLM models, bogus part-time job offers, and fraudulent online gaming platforms, according to an official statement from the Central agency.

The case was registered on the basis of inputs received from I4C, the Ministry of Home Affairs, which indicated that large numbers of citizens were being cheated through online investment and employment schemes. Although initially appearing as isolated complaints, detailed analysis by the CBI revealed striking similarities in applications used, fund-flow patterns, payment gateways, and digital footprints, pointing to a common, organised conspiracy.
Investigation revealed that the cyber criminals adopted a highly layered and technology-driven modus operandi, involving the use of Google advertisements, bulk SMS campaigns, SIM-box based messaging systems, cloud infrastructure, fintech platforms and multiple mule bank accounts. Each stage of the operation--from luring victims to the collection and movement of funds--was deliberately structured to conceal the identities of the actual controllers and evade detection by law enforcement agencies.

CBI's investigation exposed the backbone of the fraud network in the form of 111 shell companies, incorporated using dummy directors, forged or misleading documents, fake addresses and false statements of business objectives.
These shell entities were used to open bank accounts and merchant accounts with various payment gateways, enabling rapid layering and diversion of proceeds of crime. Analysis of hundreds of bank accounts revealed that more than Rs 1,000 crore was routed through these accounts, with one account alone receiving funds exceeding Rs 152 crore within a short span.
The CBI conducted searches at 27 locations across Karnataka, Tamil Nadu, Kerala, Andhra Pradesh, Jharkhand and Haryana during which they seized digital devices, documents, and financial records, which were then subjected to detailed forensic examination. The analysis revealed extensive communication links and operational control by Foreign nationals directing the fraud network from abroad.

Significantly, a UPI ID linked to the bank accounts of two Indian accused was found to be active in a Foreign location as late as August 2025, conclusively establishing continued foreign control and real-time operational oversight of the fraud infrastructure from outside India.

The investigation established that, from 2020 onwards, shell companies were incorporated in India at the instance of Foreign handlers, namely Zou Yi, Huan Liu, Weijian Liu and Guanhua Wang.
Their Indian associates procured identity documents from unsuspecting individuals and used them to incorporate companies and open bank accounts. These entities were then systematically used to channel proceeds from cyber fraud, which were layered across multiple accounts and platforms to obscure the money trail and the ultimate beneficiaries. (With ANI inputs)
 

Trading Scam On The Rise: Hyderabad Doctor Duped of ₹8.6 Crore Across 63 Transactions in Cyber Fraud​



Hyderabad-based doctor has fallen victim to a sophisticated scam, losing a staggering Rs 8.6 crore across 63 transactions under the pretext of share trading.


Hyderabad: In what is being considered the largest cyber fraud in Telangana's history, a Hyderabad-based doctor has fallen victim to a sophisticated scam, losing a staggering Rs 8.6 crore across 63 transactions under the pretext of share trading. The Telangana Cyber Security Bureau (TGCSB) has launched an investigation following the doctor’s complaint, which was filed on August 12.

The Modus Operandi​

According to the complaint, the doctor was scrolling through his Facebook account on May 21 when he came across an advertisement promoting stock broking services. After expressing interest and submitting his credentials, he was contacted via WhatsApp by individuals claiming to represent leading stock broking companies. The doctor was subsequently added to four WhatsApp groups, where the fraudsters, posing as sub-brokers, convinced him of the profitability of their investment opportunities.

Despite the doctor’s inquiries regarding the identity of regulatory bodies like NSE and BSE and the tax registration of the firms, the fraudsters dismissed these requests, citing confidentiality.

Building Trust Through Initial Profits​

To gain the doctor’s trust, the fraudsters initially allowed him to withdraw some profits after his initial investments. Encouraged by these returns, the doctor continued to invest large sums, eventually transferring a total of Rs 8.6 crore into various bank accounts provided by the scammers.

However, when the doctor attempted to withdraw his accumulated profits, the fraudsters revealed their true intentions, demanding an additional 20-30% of the profits as a withdrawal fee. Realizing he had been duped, the doctor attempted to contact customer service, only to discover that the entire operation was a scam. He immediately reported the fraud to the TGCSB.

The Scale of the Fraud​

The doctor made several significant transfers, including Rs 23.56 lakh, Rs 3 lakh, Rs 68 lakh, and Rs 17.10 lakh, between May 21 and August 8. The total loss amounted to Rs 8,60,38,022.

Tracing the Money Trail​

During their investigation, the TGCSB uncovered that the funds were funneled through "mule" accounts across the country. A mule account refers to a bank account used by criminals to transfer and launder illicit funds. These accounts often belong to unsuspecting individuals who are promised a commission for their involvement.

The investigation revealed that the fraudulent transactions were distributed across multiple accounts in cities such as Visakhapatnam, Kadapa, Mumbai, Delhi, Thane, Chennai, Lucknow, Jhansi, Indore, Ludhiana, and even Veenavanka in Karimnagar district. The TGCSB is continuing to track the funds and identify the individuals behind this massive scam.
The police have urged the public to exercise caution when responding to online advertisements or investment opportunities and to verify the legitimacy of such offers with appropriate regulatory bodies before proceeding.



Constant fraud is india, is crazy,
 

Rs 32 Lakh-Cyber Scam Busted: How Hackers Stole OTPs, Bank Details From Ola, Uber Apps To Con People​



Services like Rapido, Ola, and Uber were used to physically collect these details from different cities. The gang also employed an OTP-sharing app- HHSMS.


Dehradun: The Cyber Crime Police Station in Dehradun, with the Special Task Force (STF), successfully arrested the leader of a cyber fraud gang in Haridwar. The gang is responsible for a massive Rs 32 lakh scam and has been linked to 19 other fraud cases across 12 states.
The accused, a 31-year-old from Faridabad, Haryana, was arrested from the Jamalpur Road area in Haridwar following a detailed investigation led by Inspector Vijay Bharti of the Cyber Crime Police Station. The arrest was made possible through technical analysis, revealing the accused's involvement in a series of cyber frauds. A mobile handset with two SIM cards, one used to receive SMS alerts for fraudulent bank transactions, was seized during the arrest.

The team included SI Himmat Singh, ASI Manoj Beniwal, Constable Neeraj Negi and Constable Yogeshwar Prasad Kanti.

Techniques Used by the Cyber Fraud Gang​

The gang employed sophisticated tactics to defraud victims by creating fake websites posing as reputable stock trading companies like PIMCO Capital and Kotak Securities. Victims were lured into joining WhatsApp and Telegram groups, such as the "E19 PIMCO Stocks Pull Up Group," where the fraudsters posed as company employees, encouraging victims to download a fake app, Kotakss.Pro, for stock trading. One victim lost Rs 31,98,742 through multiple transactions after falling for the scam in June 2024, leading to the registration of FIR No. 43/2024 under sections 420, 120-B IPC, and 66(D) of the IT Act.

The gang further utilized social media platforms to solicit bank account details for fraudulent purposes. Services like Rapido, Ola, and Uber were used to physically collect these details from different cities. The gang also employed an OTP-sharing app called HHSMSApp to share bank OTPs among members, bypassing security measures by distributing the app as an APK file through WhatsApp groups.

Widespread Impact​

The arrested gang leader is implicated in 19 other fraud cases across states including Haryana, Karnataka, Rajasthan, Tamil Nadu, Uttar Pradesh, Jharkhand, Telangana, Andhra Pradesh, Gujarat, Kerala, Maharashtra, and Rajasthan. The accused admitted to receiving Rs 71 lakh in suspicious transactions in his bank account and sharing sensitive bank information with other gang members.

Police Appeal for Public Vigilance​

Senior Superintendent of Police, STF Uttarakhand, Ayush Agarwal, has issued a public advisory urging caution when using online platforms for jobs or investments. He emphasized the importance of verifying websites with local banks or companies before engaging in any financial transactions. He also advised against searching for customer care numbers on Google and encouraged the public to contact the nearest police station or Cyber Crime Police Station in case of any doubts.


Deputy Superintendent of Police, Cyber Crime Uttarakhand, Ankush Mishra, added a warning against downloading malicious APK files from unverified sources, stressing the dangers posed by such apps in facilitating cybercrime.
In cases of financial cybercrime, the public is urged to contact the helpline number 1930 immediately for assistance.
 

Ghaziabad Couple Falls Victim to ₹3 Crore Cyber Scam Through Fake Investment Scheme Via Facebook​




Nabanita Mishra reported that although she could view her investment details and the so-called profits through the company's app, she was unable to withdraw it.


Indirapuram, Ghaziabad: A couple from Indirapuram, Ghaziabad, has fallen prey to a sophisticated cyber scam, resulting in a financial loss of Rs 3 crore. Nabanita Mishra, the victim, has lodged a complaint with the local police, alleging that she and her husband, Mrinal Mishra, were deceived by a fraudulent investment scheme promoted through a Facebook advertisement.

What Exactly Happened?​

According to the FIR filed, Nabanita and Mrinal Mishra made 22 transactions totaling Rs 3.1 crore between July and August this year, transferring the money to various bank accounts. The couple claims that their ordeal began after responding to a Facebook advertisement that promised lucrative investment opportunities. They were then added to a WhatsApp group, allegedly managed by a well-known investment platform. The group administrator lured the members with a competition called GTC, which promised substantial returns on investments.

Initially, the couple paid a monthly subscription fee of Rs 2,000 for investment advice. However, they were soon convinced to make multiple high-value transactions to purchase shares and participate in IPOs, with detailed instructions provided by the company. The scammers even presented what appeared to be authentic SEBI registration details, further enhancing their credibility.

The fraudsters operated primarily through the WhatsApp group, sharing transaction details and fabricated profit statements. The Mishras were even coerced into taking an Rs 80 lakh loan, which they were told needed to be repaid to access their purported investments.

Nabanita Mishra reported that although she could view her investment details and the so-called profits through the company's app, she was unable to withdraw any money. Instead, she was asked to pay taxes to release the funds. Growing suspicious, she attempted to invest in IPOs through other legitimate platforms but found herself unable to do so. After conducting her own investigation into the possibility of cyber fraud, Nabanita uncovered disturbing information about the company behind the scheme.

When she tried to contact the members of the WhatsApp group, including other supposed investors, she discovered that all the phone numbers were unreachable. Subsequent investigations traced these numbers to Rajasthan.
A case has been registered under Section 66(D) of the IT Act, which deals with punishment for cheating by impersonation using a computer resource, and Section 318(4) of BNS, which pertains to cheating. The local police are currently investigating the matter, urging residents to remain vigilant against such online scams.
 

Phone Cloned, OTPs Forwarded: How Delhi Techie Lost ₹1.3 Lakh from Two Credit Cards in Cyber Scam​






The hacker sent Nishant a link via SMS under the pretense of conducting the video KYC. When Nishant clicked on the link, his phone was instantly cloned.

New Delhi: In a concerning case of cyber fraud, Nishant, an engineer from Delhi-NCR working at an MNC in Noida, lost ₹1.3 lakh after falling victim to a sophisticated hacking scam on Wednesday. The ordeal began when Nishant applied for a PNB credit card online, only to receive a call the next day from someone posing as a PNB representative, asking him to complete a video KYC (Know Your Customer) process.
The caller, who was actually a hacker, sent Nishant a link via SMS under the pretense of conducting the video KYC. When Nishant clicked on the link, his phone was instantly compromised, unknowingly sharing his screen with the hacker. The situation worsened when the hacker sent an APK file that was automatically downloaded via WhatsApp, giving the hacker full control over Nishant’s device.
Realizing something was amiss, Nishant quickly disconnected the call. However, the damage had already been done. The hacker gained access to OTPs from Nishant's accounts with HSBC and IndusInd Bank, which were automatically forwarded to another number. The hacker then used these OTPs to log into various financial apps, including IndusInd Bank and Paytm, and siphoned off over ₹1.3 lakh through small transactions to platforms like Paytm, Razorpay, Lazypay, MobiKwik, and Freecharge.

"I immediately reported the fraudulent activity to the banks and got my cards blocked,” Nishant recounted. “The hacker had all my information, including that I had applied for a PNB card, and even knew my parents' names. This convinced me he was a genuine employee. But as soon as he asked for video KYC on Google Meet, I suspected something was wrong. Unfortunately, by the time I realized it was a scam, it was too late.”
In a panic, Nishant and his wife spent hours trying to report the fraud by calling the government's cyber crime helpline at 1930, but they were unable to connect as all representatives were busy. The online portal, cybercrime.gov.in, also failed to load initially. Desperate, Nishant went to the cyber police station in Dwarka, Sector 17, where he was able to file a complaint after a long wait. However, the police advised him to keep trying to report the issue on the helpline. It wasn't until 1 AM that their call to 1930 finally connected.

Expert Advice on Preventing Cyber Fraud​

In response to this alarming incident, Republic spoke with Nishikant Ojha, a cyber security expert, to gather advice on how individuals can protect themselves from such scams and what steps to take if they become victims.
“These types of attacks are categorized under financial fraud, where hackers use APK files—application files for Android devices. These files are often sent via SMS or WhatsApp and are encrypted to avoid detection. Once the APK file is downloaded, it compromises the device, giving hackers control over the operating system and access to personal data, including financial credentials,” Ojha explained.


Ojha emphasized the need for vigilance when receiving unsolicited messages or links, especially those claiming urgency or offering incentives. “The APK fraud scheme often starts with messages that seem harmless but are actually loaded with malware. Once the link is clicked, the malware is installed, and hackers can mirror your phone, intercept OTPs, and even make transactions without your direct authorization.”

Precautions to Take:​

  • Enable Two-Factor Authentication: Always use two-factor authentication (2FA) for banking apps and other sensitive accounts.
  • Install Ad Blockers: These can prevent pop-ups that may carry malicious links.
  • Use Anti-Virus Software: Ensure that your phone has robust anti-virus protection to detect and block potential threats.
  • Be Cautious with Links: Never click on links from unknown sources, especially those received via SMS or social media.
  • Monitor OTPs: If you receive an OTP without initiating a transaction, be immediately alert and report it to your bank.

Steps to Take After Being Scammed:​

  • Switch Off Your Phone: This can help break the hacker’s access to your device.
  • Uninstall Suspicious Apps: Check for and remove any apps that you did not install.
  • Report to Law Enforcement: File a complaint with the cybercrime cell and provide all relevant details.
  • Contact Customer Support: Immediately notify your bank and request them to block any further transactions.
Ojha also stressed the need for banks to adopt more secure transaction methods and AI-based algorithms to detect and prevent fraudulent activities. “Banks often place the responsibility on the customer, arguing that they installed the malicious software. However, with advancements in hacking techniques, banks need to recognize that traditional OTP-based security is no longer foolproof. They should take proactive measures to safeguard customer funds and ensure that transactions are thoroughly vetted.”

Do Victims Get Refunded? Who Is Liable?​

"In some cases, banks may refund stolen money if they are proven to be at fault, but quick action is crucial. Reporting the fraud within half an hour of the incident significantly increases the chances of recovering the funds, as banks can freeze the transactions for further investigation," the cyber security expert, Nishikant Ojha said.






Thrs too many scams in India, i thought today would be a quiet day in me reporting these articles, but India does suprise me
 

Transnational Human Trafficking Case: NIA Attaches Two Assets of Wanted Cambodia-Based Indian National​





The properties involved one flat in Maharashtra's Thane and a piece of land in Bihar's Siwan district. Both had been purchased by wanted accused Anand Kumar Singh in his wife's name using money earned illegally from human trafficking activities.



New Delhi: In a move to dismantle the nexus of a transnational syndicate, the National Investigation Agency (NIA) on Wednesday said it has attached two immovable properties of a Cambodia-based Indian national.
The properties involved one flat in Maharashtra's Thane and a piece of land in Bihar's Siwan district. Both had been purchased by wanted accused Anand Kumar Singh in his wife's name using money earned illegally from human trafficking activities.
NIA's action followed the orders of its special Court at Patna in a transnational human trafficking and cyber fraud case.

"The accused, a Cambodia-based Indian national, was involved in trafficking Indian youth to Cambodia for forced criminal cyber frauds," said the NIA, citing its investigations.

The special Court of NIA at Patna had established the two properties to be proceeds of crime and had, on December 10, ordered their attachment under section 107 of Bharatiya Nagarik Suraksha Sanhita (BNSS). It had further directed that the money obtained after their auction-sale to be forfeited.
As per NIA's investigation, the accused was part of a syndicate engaged in luring vulnerable youth from India with false promise of well-paying legitimate jobs in foreign countries.

"Once the victims reached the foreign land, their passports were seized by the syndicate and they were sold to scam companies. Refusal to work for these companies led to mental and physical torture," said the NIA.
 

Transnational Human Trafficking Case: NIA Attaches Two Assets of Wanted Cambodia-Based Indian National​





The properties involved one flat in Maharashtra's Thane and a piece of land in Bihar's Siwan district. Both had been purchased by wanted accused Anand Kumar Singh in his wife's name using money earned illegally from human trafficking activities.



New Delhi: In a move to dismantle the nexus of a transnational syndicate, the National Investigation Agency (NIA) on Wednesday said it has attached two immovable properties of a Cambodia-based Indian national.
The properties involved one flat in Maharashtra's Thane and a piece of land in Bihar's Siwan district. Both had been purchased by wanted accused Anand Kumar Singh in his wife's name using money earned illegally from human trafficking activities.
NIA's action followed the orders of its special Court at Patna in a transnational human trafficking and cyber fraud case.

"The accused, a Cambodia-based Indian national, was involved in trafficking Indian youth to Cambodia for forced criminal cyber frauds," said the NIA, citing its investigations.

The special Court of NIA at Patna had established the two properties to be proceeds of crime and had, on December 10, ordered their attachment under section 107 of Bharatiya Nagarik Suraksha Sanhita (BNSS). It had further directed that the money obtained after their auction-sale to be forfeited.
As per NIA's investigation, the accused was part of a syndicate engaged in luring vulnerable youth from India with false promise of well-paying legitimate jobs in foreign countries.

"Once the victims reached the foreign land, their passports were seized by the syndicate and they were sold to scam companies. Refusal to work for these companies led to mental and physical torture," said the NIA.

Even Cambodia is not safe from these vermins.

All countries should monitor and audit all Indian businesses. :inti
 
Fraudster Arrested For Investment Scam Nation



According to cybercrime DCP V. Arvind Babu, Ansari Mohammed Umar Murad alias Umar had cheated several people in online trading


Hyderabad: Cyberpolice arrested a fraudster, who duped a victim to the tune of ₹32 lakh, from his house in Mumbai. He was linked to a Chinese national, who is the kingpin of crypto fraud. According to cybercrime DCP V. Arvind Babu, Ansari Mohammed Umar Murad alias Umar had cheated several people in online trading. “We received a complaint from a person who fell victim to an investment fraud.” The victim said he clicked on the advertisement that purportedly claimed to be of the Aditya Birla Group. When he clicked on the advertisement, he was redirected to a WhatsApp group titled “Aditya Birla Stock Elite Group 678,” where a woman introducing herself as Aiyana Joseph claimed to be a trade adviser.

“She persuaded him to invest and shared a link to download a trading application. After he installed the app, the victim was instructed to submit KYC details and bank information, after which OTC stock trading and IPO applications were shown as activated,” Arvind Babu said. The victim was later added to another WhatsApp group named “Aditya Birla High Net Worth IPO Exclusive Membership Group,” where the members were advised to invest in specific stocks and IPOs, with a promise of high returns and a demand for 20 per cent commission on profits, the DCP said.

Ansari provided multiple bank accounts for depositing funds into the fraudulent app, who showed to make substantial profits. When they asked them to deposit ₹1 crore, the victim refused, which resulted in the app getting stopped. When he realised that he had been duped of ₹32 lakh, he lodged a complaint with cybercrime, DCP said. Ansari’s associates Rishi Thushar, Inamdar Vinayaka Rajendar — both from Vadodara in Gujarat — have also been arrested.

nsari has good knowledge of cryptocurrency trading and he was in direct contact with a Chinese national and regularly communicated with him through Telegram. As per the instructions of the Chinese national, Ansari and Rishi Thushar used to convert the cheated amounts from Indian Rupees (INR) into USDT and transfer the same to the wallet addresses provided by the Chinese national. Accordingly, an amount of approximately ₹50 lakh was converted into USDT through their wallet IDs and crypto dealers and subsequently transferred to the wallets provided by the Chinese national, he added.


Modus Operandi of the accused:
* Victims are lured through links circulated on social media platforms promising stock market advice, IPO tips, or high-return investment opportunities.
* They are invited to join WhatsApp groups that project themselves as expert investment or trading advisory groups.
* Fraudsters use fake websites and mobile applications to create an illusion of legitimacy and professionalism.
* The platforms falsely display continuously increasing profits to gain the victims’ trust and confidence.
* Victims are persuaded to deposit large amounts of money into bank accounts provided by the fraudsters.
* After substantial deposits are made, the withdrawal option on the platform is deliberately disabled.
* Victims are asked to pay additional charges such as taxes, service fees, or currency conversion fees to “release” the funds. * The platforms are entirely fake, and the displayed profits are fictitious, resulting in total loss of the invested money.
 

CBI charge sheet names 17 persons, 58 firms for cyberfraud​





Bank accounts of shell entities used to allegedly route over ₹1,000 crore, with one account alone receiving funds exceeding ₹152 crore within a short span


The Central Bureau of Investigation (CBI) has filed a charge sheet against 17 accused individuals, including four Chinese nationals, and 58 companies, after unearthing a large and well-organised transnational cyber fraud network operating across multiple States in India.
 

CBI Busts Rs 1,000 Crore Cyber Fraud Involving 4 Foreigners, 111 Shell Firms​





The investigation revealed transfer of over Rs 1,000 crore through hundreds of bank accounts, with one account receiving more than Rs 152 crore.


Misleading loan applications, bogus investment schemes, false part-time job offers, and fraudulent online gaming platforms are key tools to defrauding thousands of people across the country, reveals the latest international cyber fraud network busted by the Central Bureau of Investigation (CBI).

The investigation agency has filed a chargesheet against 17 people, including four foreign nationals and 58 companies involved in transnational cybercrime. Three main accused in this case were arrested earlier in October.

The network was defrauding people through Ponzi schemes and Multi-Level Marketing (MLM) models, along with fraudulent apps and job offers.

CBI Busts Cyber Fraud Network

The case was registered based on information received from the Indian Cyber Crime Coordination Centre under the Ministry of Home Affairs, which flagged a surge in online investment and employment frauds.

Initially, the complaints appeared to be separate cases, but an in-depth analysis exposed a larger network using similar mobile applications, fund-flow patterns, payment gateways, and digital footprints.

The investigation also revealed that the cyber fraudsters employed a highly layered, technology-driven modus operandi, leveraging Google advertisements, bulk SMS campaigns, SIM-box messaging systems, cloud servers, fintech platforms and dozens of mule bank accounts to mask the identities of the real controllers and evade law enforcement scrutiny.

At the core of the operation were 111 shell companies, created using fake directors, forged documents, fake addresses and falsified business objectives. These entities enabled opening of bank accounts and payment gateways.

The investigation revealed transfer of over Rs 1,000 crore through hundreds of bank accounts, with a single account receiving more than Rs 152 crore within a short period.

The CBI conducted searches at 27 locations across Karnataka, Tamil Nadu, Kerala, Andhra Pradesh, Jharkhand and Haryana and seized digital devices, documents and financial records. Forensic examination uncovered direct operational control by foreign nationals from abroad.

A UPI ID linked to two Indian accused remained active from a foreign location as late as August 2025, establishing real-time overseas supervision.

The probe identified the foreign handlers as Zou Yi, Huan Liu, Weijian Liu and Guanhua Wang, who allegedly orchestrated the incorporation of shell companies in India from 2020 onwards.

This action is part of the CBI's Operation CHAKRA-V, aimed at curbing organised and international cyber economic crimes in the country.
 
Back
Top