Cybercrime & Fraud
Police Uncover Fake Degree Network, Seals of 25 Universities Used
Lucknow authorities have dismantled a sophisticated network producing counterfeit academic degrees and certificates, allegedly supplying fake credentials to job seekers across multiple Indian states. The operation, uncovered after a police raid, involved documents bearing the names and insignia of at least 25 universities, including Swami Vivekanand Subharti University, Kalinga University, and Sabarmati University.
Three men—Satyendra Dwivedi of Ayodhya, Akhilesh Kumar of Unnao, and Saurabh Sharma of Lakhimpur Kheri—were arrested for running the forgery operation. Investigators describe the network as highly organized, producing certificates sophisticated enough to pass casual checks by employers, particularly in the private sector.
How the Counterfeit Scheme Worked
Police recovered over 900 forged degrees, 15 fake seals, multiple letterheads, and six laptops believed to have been used to design and print the documents. Certificates were reportedly customized to match the buyer’s claimed academic background.
Pricing varied by qualification:
- Bachelor’s or Master’s degrees: ₹15,000–₹25,000
- Engineering or management degrees: ₹50,000–₹1,00,000
- PhDs: up to ₹4,00,000
Authorities estimate the operation had been active since 2021, meeting consistent demand from individuals seeking to bypass formal education requirements. Investigators noted that Dwivedi, who holds a doctorate in sociology, may have lent credibility and technical know-how to the scheme.
Tracking the Buyers
The police investigation has expanded to include approximately 1,500 individuals who purchased fake degrees, many of whom reportedly used the documents to secure employment. Deputy Commissioner of Police (East), Shashank Singh, warned that “strict legal action will be taken against them as well.”
Authorities face the challenge of determining how widely the fake credentials circulated and the extent to which employers failed to verify academic claims. The fallout could affect thousands of jobs if fraudulent degrees are invalidated.
Implications for Education and Employment
The case has highlighted vulnerabilities in systems meant to protect academic and professional standards. The recovery of fake seals and letterheads from reputed institutions demonstrates how easily symbols of legitimacy can be replicated. For now, authorities are focused on verification, documentation, and accountability as the full scope of the network comes to light.
Cyber & Financial Fraud
Crores Lost via Mule Accounts: Delhi Cyber Police Bust Investment Fraud Syndicate, Five Arrested
The South-West Delhi Cyber Police have dismantled a sophisticated investment fraud network that lured victims with promises of high returns, arresting five individuals involved in facilitating cyber fraud across India through mule bank accounts. The syndicate, primarily operated from Maharashtra, reportedly maintained links with Dubai-based associates.
Fraudulent Investment Scheme
The accused—Shridhar Dilip Ingle (25), Archiryan Goraksh Kamble (21), Ajij Miran Shaikh (25), Pranav Jalinder Guldagad (24), and Vishal Durgadas Bachal (25)—allegedly coordinated the use of bank accounts provided by unsuspecting individuals or coerced participants. These accounts were then used to transfer funds collected from victims across multiple states.
The case emerged after a resident of Arunachal Pradesh, currently living in Delhi, filed a complaint via the National Cyber Crime Reporting Portal (NCRP) on September 4, 2025. The complainant alleged being duped into investing ₹12,22,670 in a fake stock market company called “Next Billion Technology Pvt Ltd.” A woman identifying herself as Parineeti Jain and her associates reportedly contacted the victim, promising lucrative returns and persuading him to transfer money into accounts supplied by the accused.
Mule Accounts and Dubai Connection
Police investigations revealed that the syndicate relied on a network of mule accounts, which were provided on commission and often sourced from individuals deceived or incentivized to allow use of their bank accounts. One key associate, “Chaitanya”, based in Dubai, reportedly managed operations at an international level, coordinating funds transferred through these accounts.
Following technical analysis, surveillance, and financial tracking, authorities apprehended the main suspect, Shridhar Dilip Ingle, in Shrirampur, Maharashtra, and subsequently arrested the remaining four accused during coordinated raids.
Evidence and Ongoing Investigation
Authorities recovered six mobile phones and obtained records of 35 bank accounts connected to fraudulent transactions. Preliminary analysis indicates that crores of rupees were routed through these accounts, highlighting the scale and sophistication of the fraud.
The case underscores how cybercriminals exploit technological loopholes and banking systems to defraud unsuspecting investors. Investigators are now tracing additional links in the network, including the Dubai connection, which may uncover further international collaborations.
Authorities have cautioned the public to verify the legitimacy of investment opportunities and avoid transferring money to unknown platforms or individuals. Experts emphasize the importance of due diligence to prevent falling victim to such scams.
Cybercrime
SIM Box Cyber Fraud Network Busted: CBI Arrests Company Directors
In a significant cybercrime bust, the Central Bureau of Investigation (CBI) has dismantled an organized SIM Box fraud network targeting unsuspecting victims. Two company directors have been arrested for allegedly creating a shell company to procure bulk SIM cards, which were then exploited in large-scale cyber fraud operations.
How the Fraud Operated
The accused, identified as Mohammed Vival and Mohammed Dilshad, were apprehended in Meerut. Investigations revealed that the duo registered a company in January 2025, ostensibly to supply SIM cards for employee use. However, the cards were diverted for fraudulent activities via SIM Box systems, allowing the perpetrators to manipulate call routing and conceal the true origin of calls.
A total of 108 SIM cards linked to the company were flagged on the Chakshu portal, following multiple complaints from victims reporting suspicious calls. SIM Box technology enables criminals to impersonate authorities, banks, or government officials, coercing victims into sharing sensitive information or transferring money through psychological manipulation.
Coordinated Raids and Evidence Seized
The CBI executed coordinated raids across six locations in Meerut and Noida, including the accused’s offices, SIM Box infrastructure sites, a telecom operator’s zonal office, and a private SIM verification facility. Officials recovered laptops, mobile phones, hard disks, and a cache of SIM cards, including one foreign SIM from Nepal, suggesting potential international links.
Authorities believe the network may involve additional actors, indicating a well-coordinated and organized syndicate. The scale of SIM procurement and technical sophistication of routing mechanisms underscores the level of planning involved.
Rising Threat of SIM Box Fraud
Cybercrime experts highlight SIM Box fraud as one of the most dangerous emerging cyber threats. Prof. Triveni Singh, former IPS officer and cybersecurity expert, commented, “Criminals combine technical manipulation with social engineering to impersonate trusted authorities, pressuring victims into financial transactions. Awareness and immediate reporting are critical defenses.”
The anonymity provided by SIM Box technology makes detection and prosecution challenging, emphasizing the need for stricter SIM verification processes and closer coordination between telecom operators and law enforcement agencies.
The CBI continues to probe the full extent of the network, with investigators examining potential international connections and other individuals involved. Further updates are expected in the coming days, shedding light on the broader implications for telecom security and cyber fraud prevention.
Cybercrime
₹2.52 Crore Digital Arrest Scam Busted, Four Accused Arrested, Cyber Fraud Network Spreads Across Delhi and Other States
Gwalior authorities have successfully dismantled a ₹2.52 crore digital arrest scam, arresting four individuals linked to a sprawling cyber fraud ring operating across Delhi and multiple Indian states. The Crime Branch’s investigation revealed that the fraudsters impersonated officials from a central investigative agency and psychologically coerced a retired Indian Air Force radiologist into transferring large sums of money over 27 days of continuous video surveillance.
Multi-State Money Movement Across 15 States
The investigation uncovered a complex money laundering operation involving more than 300 bank accounts across 15 states including Delhi, Uttar Pradesh, Andhra Pradesh, Rajasthan, Chhattisgarh, Odisha, Jharkhand, Bihar, Assam, and Karnataka. Initially, approximately ₹1.5 crore was funneled into two accounts in Andhra Pradesh, while nearly ₹1 crore was transferred to three accounts across Delhi and Uttar Pradesh. The funds were quickly dispersed through multiple accounts to evade detection.
Suspicious Shell Company Under Scrutiny
Authorities also traced part of the scam’s financial trail to a Delhi-based shell company named “Jingga Crunch and Snacks.” The firm’s bank account was reportedly used to facilitate fraudulent transactions. Police raided multiple shops linked to the firm and detained two suspects, Mohit Mishra and Shahil Khan. Both admitted to receiving commissions for allowing their company’s account to be exploited, though they claimed no involvement in the core fraudulent operations. Investigators suspect the firm was a front directed by higher-ranking members of the cybercriminal syndicate.
Arrests and Network Breakdown
Further probes led to the arrest of Rahul Prajapati and Harish Yadav, accused of opening mule accounts and managing financial channels for the scam. The gang used psychological manipulation—threatening victims with legal repercussions and instructing them to avoid contact with others—to instill fear and compliance. The retired doctor, their prime victim, was falsely told he was under investigation, prompting him to comply with repeated demands for money transfers.
Anatomy of a Digital Arrest Scam
Cybersecurity experts characterize such scams as evolving schemes that exploit fear to extract money via online banking. The Future Crime Research Foundation noted that the use of mule accounts and multi-layered transactions complicates tracing stolen funds and identifying perpetrators. Law enforcement continues interrogations and is actively working to dismantle the entire fraud network, which they believe has additional active members.
Authorities urge the public to remain vigilant and avoid sharing personal or financial details with unknown callers, especially those employing aggressive or threatening tactics via phone or video calls.
-
Business3 years agoPot Odor Does Not Justify Probable Cause for Vehicle Searches, Minnesota Court Affirms
-
Business2 years agoNew Mexico cannabis operator fined, loses license for alleged BioTrack fraud
-
Business2 years agoAlabama to make another attempt Dec. 1 to award medical cannabis licenses
-
Business3 years agoWashington State Pays Out $9.4 Million in Refunds Relating to Drug Convictions
-
Business2 years agoMarijuana companies suing US attorney general in federal prohibition challenge
-
Business3 years agoLegal Marijuana Handed A Nothing Burger From NY State
-
Business3 years agoCan Cannabis Help Seasonal Depression
-
Blogs3 years agoCannabis Art Is Flourishing On Etsy
