Connect with us

Cybercrime

Key Accused in ₹8.1 Crore Cyber Fraud Case Linked to Ex-Punjab IG Dies in Patiala Hospital

Published

on

Chander Kant, a prime accused in the ₹8.1 crore cyber fraud case connected to retired Punjab Police IG AS Chahal, passed away at Government Rajindra Hospital in Patiala on January 9 due to complications from diabetes. The 40-year-old suspect, who had been arrested in Maharashtra and was under judicial remand, died around 4 PM, adding a dramatic twist to the ongoing high-profile investigation.

Twist in a High-Profile Cybercrime Case

Kant was among seven individuals apprehended in Maharashtra, including Lakhan Srichand, Somnath, Ranjit Nambardar, Prateek Uttam, Ashish Kumar Pandey, and Mohammad Sharif. The group allegedly facilitated a network of SIM card activations in India, which were then sent to the UAE to carry out phishing, OTP scams, and banking fraud. Patiala Cyber Crime Police have registered an FIR under multiple sections of the Indian Penal Code and the IT Act, including conspiracy, cheating, forgery, and impersonation.

The arrests came shortly after Chahal reportedly attempted self-harm at his Patiala residence on December 22, 2025. The gang’s operations are believed to have caused financial losses totaling ₹8.1 crore. Kant’s health deteriorated during a court remand hearing on January 9, necessitating hospitalization. A post-mortem examination was scheduled for January 10.

Unraveling an International SIM Fraud Network

Investigations indicate that Kant played a central role in sourcing SIM cards domestically, bypassing Know Your Customer (KYC) regulations through intermediaries, and shipping them abroad to UAE-based fraud syndicates. Authorities note that Punjab has increasingly become a hub for such cyber fraud activities, with over 15,000 complaints linked to international scams reported in 2025 alone.

The probe is examining whether Chahal’s involvement was unwitting or coerced, as investigators explore the retired IG’s potential connection to the fraud network.

Police Investigations Continue Amid Setback

Kant’s death has shifted the focus of investigators to the remaining six accused, who remain in judicial custody. Police are tracing financial transactions, conducting CDR (Call Detail Record) analysis, and freezing assets linked to the syndicate. Raids on SIM vendors have intensified as part of a nationwide crackdown under recent Telecom Act amendments.

A forensic audit of Chahal’s electronic devices is ongoing. Meanwhile, Chahal’s family maintains that he had no deliberate involvement in the fraud, citing fears of extortion and coercion.

Broader Implications for Cybercrime Control

The case highlights the pervasive use of SIM mule networks in financial fraud, which account for nearly 70% of such crimes. It also raises concerns about the health risks faced by suspects with chronic illnesses while in custody. Additionally, the investigation is probing possible insider collusion within the Punjab police force, signaling broader challenges in combating organized cybercrime.

Cyber & Financial Fraud

Crores Lost via Mule Accounts: Delhi Cyber Police Bust Investment Fraud Syndicate, Five Arrested

Published

on

By

The South-West Delhi Cyber Police have dismantled a sophisticated investment fraud network that lured victims with promises of high returns, arresting five individuals involved in facilitating cyber fraud across India through mule bank accounts. The syndicate, primarily operated from Maharashtra, reportedly maintained links with Dubai-based associates.

Fraudulent Investment Scheme

The accused—Shridhar Dilip Ingle (25), Archiryan Goraksh Kamble (21), Ajij Miran Shaikh (25), Pranav Jalinder Guldagad (24), and Vishal Durgadas Bachal (25)—allegedly coordinated the use of bank accounts provided by unsuspecting individuals or coerced participants. These accounts were then used to transfer funds collected from victims across multiple states.

The case emerged after a resident of Arunachal Pradesh, currently living in Delhi, filed a complaint via the National Cyber Crime Reporting Portal (NCRP) on September 4, 2025. The complainant alleged being duped into investing ₹12,22,670 in a fake stock market company called “Next Billion Technology Pvt Ltd.” A woman identifying herself as Parineeti Jain and her associates reportedly contacted the victim, promising lucrative returns and persuading him to transfer money into accounts supplied by the accused.

Mule Accounts and Dubai Connection

Police investigations revealed that the syndicate relied on a network of mule accounts, which were provided on commission and often sourced from individuals deceived or incentivized to allow use of their bank accounts. One key associate, “Chaitanya”, based in Dubai, reportedly managed operations at an international level, coordinating funds transferred through these accounts.

Following technical analysis, surveillance, and financial tracking, authorities apprehended the main suspect, Shridhar Dilip Ingle, in Shrirampur, Maharashtra, and subsequently arrested the remaining four accused during coordinated raids.

Evidence and Ongoing Investigation

Authorities recovered six mobile phones and obtained records of 35 bank accounts connected to fraudulent transactions. Preliminary analysis indicates that crores of rupees were routed through these accounts, highlighting the scale and sophistication of the fraud.

The case underscores how cybercriminals exploit technological loopholes and banking systems to defraud unsuspecting investors. Investigators are now tracing additional links in the network, including the Dubai connection, which may uncover further international collaborations.

Authorities have cautioned the public to verify the legitimacy of investment opportunities and avoid transferring money to unknown platforms or individuals. Experts emphasize the importance of due diligence to prevent falling victim to such scams.

Continue Reading

Cybercrime

SIM Box Cyber Fraud Network Busted: CBI Arrests Company Directors

Published

on

By

In a significant cybercrime bust, the Central Bureau of Investigation (CBI) has dismantled an organized SIM Box fraud network targeting unsuspecting victims. Two company directors have been arrested for allegedly creating a shell company to procure bulk SIM cards, which were then exploited in large-scale cyber fraud operations.

How the Fraud Operated

The accused, identified as Mohammed Vival and Mohammed Dilshad, were apprehended in Meerut. Investigations revealed that the duo registered a company in January 2025, ostensibly to supply SIM cards for employee use. However, the cards were diverted for fraudulent activities via SIM Box systems, allowing the perpetrators to manipulate call routing and conceal the true origin of calls.

A total of 108 SIM cards linked to the company were flagged on the Chakshu portal, following multiple complaints from victims reporting suspicious calls. SIM Box technology enables criminals to impersonate authorities, banks, or government officials, coercing victims into sharing sensitive information or transferring money through psychological manipulation.

Coordinated Raids and Evidence Seized

The CBI executed coordinated raids across six locations in Meerut and Noida, including the accused’s offices, SIM Box infrastructure sites, a telecom operator’s zonal office, and a private SIM verification facility. Officials recovered laptops, mobile phones, hard disks, and a cache of SIM cards, including one foreign SIM from Nepal, suggesting potential international links.

Authorities believe the network may involve additional actors, indicating a well-coordinated and organized syndicate. The scale of SIM procurement and technical sophistication of routing mechanisms underscores the level of planning involved.

Rising Threat of SIM Box Fraud

Cybercrime experts highlight SIM Box fraud as one of the most dangerous emerging cyber threats. Prof. Triveni Singh, former IPS officer and cybersecurity expert, commented, “Criminals combine technical manipulation with social engineering to impersonate trusted authorities, pressuring victims into financial transactions. Awareness and immediate reporting are critical defenses.”

The anonymity provided by SIM Box technology makes detection and prosecution challenging, emphasizing the need for stricter SIM verification processes and closer coordination between telecom operators and law enforcement agencies.

The CBI continues to probe the full extent of the network, with investigators examining potential international connections and other individuals involved. Further updates are expected in the coming days, shedding light on the broader implications for telecom security and cyber fraud prevention.

Continue Reading

Cybercrime

Courier Booking Turns Into ‘APK Trap’: Retired Army Officer Loses Lakhs in Cyber Fraud

Published

on

By

In a chilling reminder of the growing sophistication of online fraud, a retired Army officer from Chandigarh reportedly lost more than ₹12 lakh after falling victim to a cyber scam disguised as a courier service transaction. Authorities say the incident involved a malicious APK file that compromised his banking credentials, enabling cybercriminals to siphon off funds through unauthorized transactions.

Routine Courier Booking Turns Into Costly Trap

Colonel Rajbir Singh Duggal, 82, was attempting to send a parcel from Chandigarh to Pune when the scam unfolded. While searching online for the contact number of a well-known courier company, he reportedly called a number that appeared legitimate. The person on the other end claimed to be a company executive and guided him through the booking process.

During the conversation, he was instructed to make a small online payment of ₹10 to confirm the pickup. After initially encountering a failed transaction on his SBI account, he completed the payment via his HDFC credit card.

Shortly afterward, the caller directed him to download a mobile application via a link shared on WhatsApp, claiming it was necessary to complete the courier request. Trusting the instructions, the retired officer installed the APK file on his smartphone.

How Malicious APK Files Exploit Mobile Devices

Cybersecurity investigators revealed that the APK file was malware engineered to access sensitive information on the victim’s device. Once installed, the software obtained permissions that allowed it to monitor SMS messages, notifications, and on-screen activity.

Experts note that malicious applications often exploit Android’s accessibility settings. Once granted, these permissions let attackers intercept one-time passwords (OTPs), capture banking credentials, and even conduct financial transactions without the user’s knowledge. In this case, the fraudsters reportedly used stolen OTPs and account details to transfer over ₹12 lakh across multiple accounts.

Expert Warnings: Verify Contacts and Avoid Unknown Apps

Cybercrime specialists stress that scams of this nature combine technical tricks with social engineering. Prof. Triveni Singh, former IPS officer and cybercrime expert, warns that APK files circulated via messaging apps under the guise of courier services or delivery updates can be extremely dangerous.

Experts advise verifying all service contacts directly through official websites or verified mobile apps. They also emphasize that APK files from unknown sources should never be installed, as they can provide attackers full access to personal and financial information stored on smartphones.

Staying Safe in the Digital Age

The incident serves as a stark reminder of the importance of vigilance in online interactions. Avoiding suspicious links, confirming official contacts, and refusing to download unfamiliar applications remain the most effective defenses against cyber fraud.

As mobile banking and digital transactions become increasingly common, experts urge users of all ages to exercise caution and educate themselves about potential online threats.

Continue Reading

Trending

Copyright © 2022 420 Reports Marijuana News & Information Website | Reefer News | Cannabis News