Connect with us

Cybercrime

Major Aadhaar Updation Fraud Exposed: Software Engineer Arrested for Cloning Fingerprints and Iris Scans

Published

on

Balaghat Police have arrested 39-year-old software engineer Mohsin Khan in a major Aadhaar updation fraud case, revealing vulnerabilities in India’s biometric identity system. Khan allegedly operated an illegal setup for over a decade, manipulating fingerprints, iris data, and using unauthorized software tools to process Aadhaar updates fraudulently.

Key Details of the Case

Raid and Evidence Seized

The investigation began after a complaint was filed at Bharveli Police Station. During a raid, authorities seized:

  • Laptops with biometric manipulation programs
  • Fake silicone fingerprints
  • Digital iris scanning replicas
  • High-resolution fingerprint recording tools
  • Unauthorized Aadhaar updation equipment

Investigators noted that many of these tools were custom-developed or imported, designed to bypass UIDAI’s authentication system.

Cloned Operator Credentials

Khan allegedly created biometric clones of authorized Aadhaar operators, allowing him to log into the portal using stolen credentials. He reportedly used artificial iris models to bypass the system’s iris-based authentication, processing updates without approval or physical presence.

Long-Running Operation

Preliminary investigation suggests that Khan’s activities date back to 2011, making this one of the longest-running Aadhaar-related cybercrimes in India. Authorities are scrutinizing thousands of Aadhaar records for possible tampering, which could have enabled identity theft, financial fraud, and unauthorized access to government services and banking systems.

Potential Network and Administrative Links

Police are investigating whether Khan had bureaucratic support or connections that helped him evade detection. Examination is underway of:

  • Digital transaction histories
  • Device forensics
  • Aadhaar update logs
  • Network activity of clients

Implications for National Security and Privacy

The case has reignited concerns about the security of biometric identity systems. Cybersecurity experts warn that biometric cloning technologies, if exploited, pose serious risks to citizen privacy, banking infrastructure, and government digital platforms.

Authorities are continuing the investigation, and additional arrests or disclosures may follow.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cyber & Financial Fraud

Crores Lost via Mule Accounts: Delhi Cyber Police Bust Investment Fraud Syndicate, Five Arrested

Published

on

By

The South-West Delhi Cyber Police have dismantled a sophisticated investment fraud network that lured victims with promises of high returns, arresting five individuals involved in facilitating cyber fraud across India through mule bank accounts. The syndicate, primarily operated from Maharashtra, reportedly maintained links with Dubai-based associates.

Fraudulent Investment Scheme

The accused—Shridhar Dilip Ingle (25), Archiryan Goraksh Kamble (21), Ajij Miran Shaikh (25), Pranav Jalinder Guldagad (24), and Vishal Durgadas Bachal (25)—allegedly coordinated the use of bank accounts provided by unsuspecting individuals or coerced participants. These accounts were then used to transfer funds collected from victims across multiple states.

The case emerged after a resident of Arunachal Pradesh, currently living in Delhi, filed a complaint via the National Cyber Crime Reporting Portal (NCRP) on September 4, 2025. The complainant alleged being duped into investing ₹12,22,670 in a fake stock market company called “Next Billion Technology Pvt Ltd.” A woman identifying herself as Parineeti Jain and her associates reportedly contacted the victim, promising lucrative returns and persuading him to transfer money into accounts supplied by the accused.

Mule Accounts and Dubai Connection

Police investigations revealed that the syndicate relied on a network of mule accounts, which were provided on commission and often sourced from individuals deceived or incentivized to allow use of their bank accounts. One key associate, “Chaitanya”, based in Dubai, reportedly managed operations at an international level, coordinating funds transferred through these accounts.

Following technical analysis, surveillance, and financial tracking, authorities apprehended the main suspect, Shridhar Dilip Ingle, in Shrirampur, Maharashtra, and subsequently arrested the remaining four accused during coordinated raids.

Evidence and Ongoing Investigation

Authorities recovered six mobile phones and obtained records of 35 bank accounts connected to fraudulent transactions. Preliminary analysis indicates that crores of rupees were routed through these accounts, highlighting the scale and sophistication of the fraud.

The case underscores how cybercriminals exploit technological loopholes and banking systems to defraud unsuspecting investors. Investigators are now tracing additional links in the network, including the Dubai connection, which may uncover further international collaborations.

Authorities have cautioned the public to verify the legitimacy of investment opportunities and avoid transferring money to unknown platforms or individuals. Experts emphasize the importance of due diligence to prevent falling victim to such scams.

Continue Reading

Cybercrime

SIM Box Cyber Fraud Network Busted: CBI Arrests Company Directors

Published

on

By

In a significant cybercrime bust, the Central Bureau of Investigation (CBI) has dismantled an organized SIM Box fraud network targeting unsuspecting victims. Two company directors have been arrested for allegedly creating a shell company to procure bulk SIM cards, which were then exploited in large-scale cyber fraud operations.

How the Fraud Operated

The accused, identified as Mohammed Vival and Mohammed Dilshad, were apprehended in Meerut. Investigations revealed that the duo registered a company in January 2025, ostensibly to supply SIM cards for employee use. However, the cards were diverted for fraudulent activities via SIM Box systems, allowing the perpetrators to manipulate call routing and conceal the true origin of calls.

A total of 108 SIM cards linked to the company were flagged on the Chakshu portal, following multiple complaints from victims reporting suspicious calls. SIM Box technology enables criminals to impersonate authorities, banks, or government officials, coercing victims into sharing sensitive information or transferring money through psychological manipulation.

Coordinated Raids and Evidence Seized

The CBI executed coordinated raids across six locations in Meerut and Noida, including the accused’s offices, SIM Box infrastructure sites, a telecom operator’s zonal office, and a private SIM verification facility. Officials recovered laptops, mobile phones, hard disks, and a cache of SIM cards, including one foreign SIM from Nepal, suggesting potential international links.

Authorities believe the network may involve additional actors, indicating a well-coordinated and organized syndicate. The scale of SIM procurement and technical sophistication of routing mechanisms underscores the level of planning involved.

Rising Threat of SIM Box Fraud

Cybercrime experts highlight SIM Box fraud as one of the most dangerous emerging cyber threats. Prof. Triveni Singh, former IPS officer and cybersecurity expert, commented, “Criminals combine technical manipulation with social engineering to impersonate trusted authorities, pressuring victims into financial transactions. Awareness and immediate reporting are critical defenses.”

The anonymity provided by SIM Box technology makes detection and prosecution challenging, emphasizing the need for stricter SIM verification processes and closer coordination between telecom operators and law enforcement agencies.

The CBI continues to probe the full extent of the network, with investigators examining potential international connections and other individuals involved. Further updates are expected in the coming days, shedding light on the broader implications for telecom security and cyber fraud prevention.

Continue Reading

Cybercrime

Courier Booking Turns Into ‘APK Trap’: Retired Army Officer Loses Lakhs in Cyber Fraud

Published

on

By

In a chilling reminder of the growing sophistication of online fraud, a retired Army officer from Chandigarh reportedly lost more than ₹12 lakh after falling victim to a cyber scam disguised as a courier service transaction. Authorities say the incident involved a malicious APK file that compromised his banking credentials, enabling cybercriminals to siphon off funds through unauthorized transactions.

Routine Courier Booking Turns Into Costly Trap

Colonel Rajbir Singh Duggal, 82, was attempting to send a parcel from Chandigarh to Pune when the scam unfolded. While searching online for the contact number of a well-known courier company, he reportedly called a number that appeared legitimate. The person on the other end claimed to be a company executive and guided him through the booking process.

During the conversation, he was instructed to make a small online payment of ₹10 to confirm the pickup. After initially encountering a failed transaction on his SBI account, he completed the payment via his HDFC credit card.

Shortly afterward, the caller directed him to download a mobile application via a link shared on WhatsApp, claiming it was necessary to complete the courier request. Trusting the instructions, the retired officer installed the APK file on his smartphone.

How Malicious APK Files Exploit Mobile Devices

Cybersecurity investigators revealed that the APK file was malware engineered to access sensitive information on the victim’s device. Once installed, the software obtained permissions that allowed it to monitor SMS messages, notifications, and on-screen activity.

Experts note that malicious applications often exploit Android’s accessibility settings. Once granted, these permissions let attackers intercept one-time passwords (OTPs), capture banking credentials, and even conduct financial transactions without the user’s knowledge. In this case, the fraudsters reportedly used stolen OTPs and account details to transfer over ₹12 lakh across multiple accounts.

Expert Warnings: Verify Contacts and Avoid Unknown Apps

Cybercrime specialists stress that scams of this nature combine technical tricks with social engineering. Prof. Triveni Singh, former IPS officer and cybercrime expert, warns that APK files circulated via messaging apps under the guise of courier services or delivery updates can be extremely dangerous.

Experts advise verifying all service contacts directly through official websites or verified mobile apps. They also emphasize that APK files from unknown sources should never be installed, as they can provide attackers full access to personal and financial information stored on smartphones.

Staying Safe in the Digital Age

The incident serves as a stark reminder of the importance of vigilance in online interactions. Avoiding suspicious links, confirming official contacts, and refusing to download unfamiliar applications remain the most effective defenses against cyber fraud.

As mobile banking and digital transactions become increasingly common, experts urge users of all ages to exercise caution and educate themselves about potential online threats.

Continue Reading

Trending

Copyright © 2022 420 Reports Marijuana News & Information Website | Reefer News | Cannabis News