Cybersecurity
Transnational Cybercrime Ring Exposed: Indore Investigation Uncovers Laos-Based Scam Network Targeting Indians
By The420 Web Desk
Updated: December 1, 2025, 10:31 AM
INDORE: A major cyber-fraud investigation in central India has revealed a sophisticated transnational network exploiting Indians through digital scams, human trafficking, and organized operations spanning from India to the Golden Triangle Special Economic Zone (GTSEZ) in Laos.
The Trigger: A Single Call
The case came to light after a 59-year-old woman in Indore received a distressing video call. Scammers posing as officials from India’s CBI, ED, RBI, and local police falsely accused her of involvement in a money-laundering case. They claimed compliance with their verification process was her only way to avoid arrest.
Over several days, the perpetrators gained access to her bank accounts and siphoned ₹1.60 crore. When the woman reported the fraud, the Indore Crime Branch launched a probe that ultimately uncovered a sprawling criminal enterprise.
Mapping a Vast Network
Investigators discovered that the network extended well beyond Indore, with operations spanning Madhya Pradesh, Gujarat, Punjab, Uttar Pradesh, and West Bengal. Recruitment in India fed into organized scam centers in Laos, where trafficked workers were forced to execute complex digital fraud schemes under strict supervision.
The GTSEZ, notorious for opaque regulations and extraterritorial control, functioned as a central hub. Arrests in India, including Gujarat’s Saurabh Singh and Punjab’s Patras Kumar (alias “Kelis”), helped authorities piece together how victims were lured through fake “data-entry” jobs in Thailand and diverted to Laos, where escape was nearly impossible.
Inside the Scam Operations
Evidence from interrogations and forensic data revealed a hierarchical structure resembling corporate organizations. At the entry level, “finders” scouted social media and dating platforms for vulnerable targets. “Chatters” then built relationships over time to prepare victims for extortion or fraudulent investments.
Team leaders managed daily quotas, while directors supervised multiple teams. Foreign supervisors, reportedly Chinese nationals, were at the top, including an individual referred to as “Lizo.” Authorities have released Lizo’s photo via the BharatPol Portal as part of an ongoing international identification effort.
The network relied heavily on Indian SIM cards—over 350 obtained with forged documents—smuggled into Laos to make calls appear domestic despite originating abroad, a tactic designed to avoid detection.
Human Cost of the Operation
While the financial losses were significant, the physical and psychological abuse suffered by trafficked workers was severe. Rescued individuals reported coercion, beatings, confinement, and even electric shocks. Workers were forced to labor up to 18 hours a day, punished for missed targets, and restrained in dark rooms.
“This was not ordinary cybercrime. This was cybercrime enforced through physical violence,” said Rajesh Dandotiya, Additional DCP (Crime), overseeing the investigation.
Authorities are conducting an extensive cyber-forensic review of devices, tracking illicit financial flows, and analyzing communications with foreign handlers. Disturbing video evidence is also being examined to corroborate testimonies of abuse.
A dedicated task force in Indore is coordinating with central agencies and international partners in Laos and Thailand to dismantle the network at its source.
AI & Technology
Delhi Police Expose Crypto-Laundering Network Using Chinese Apps, Two Arrested Firm Under Probe
New Delhi: The Delhi Police Crime Branch has uncovered a sophisticated cyber-laundering network that used Chinese-controlled mobile apps and fake company bank accounts to convert proceeds of cyber fraud into cryptocurrency. Two suspects have been arrested, and investigators say the racket spans multiple states with links to foreign handlers.
Elderly Victim Defrauded of ₹33.10 Lakh in Stock Investment Scam
The investigation began after an elderly Delhi resident filed an online FIR reporting a ₹33.10 lakh loss in a fake stock investment scheme. According to DCP (Crime Branch) Aditya Gautam, the victim was lured with promises of high returns before the money was siphoned off through multiple fake entities.
A team led by Inspector Ashok Kumar traced the fund trail and discovered that the money had been split and deposited across fake company accounts to obscure its origin.
Ayodhya Resident First Arrested After Fake Company Account Identified
Police found that ₹10.38 lakh was transferred to the bank account of a fictitious company named Belcrest. The account holder, Lakshya Singh of Ayodhya, was arrested on November 19.
Singh admitted he opened the account using forged documents provided by another accused, Shubham, in exchange for ₹20,000. He claimed no knowledge of the fraud and said he simply “rented out” his account.
Mastermind Shubham Nabbed Through IP Tracking of Social Media Accounts
Shubham had been evading arrest by frequently switching mobile numbers and locations. However, Crime Branch officers traced him using the IP address of his Instagram account, eventually leading to his arrest in Tilak Nagar.
During interrogation, he confessed to working under the instructions of a foreign handler, helping move fraudulent funds through India-based shell companies.
Chinese-Controlled “Cool” App Used to Convert Stolen Funds Into Cryptocurrency
A major breakthrough in the case was the discovery that the gang used a Chinese-controlled app named “Cool” to convert stolen money into cryptocurrency.
How the laundering network operated:
- Victim funds were funneled into accounts of shell companies.
- Money was then transferred to the Cool app.
- The app was used to buy cryptocurrency on behalf of the foreign handler.
- Crypto assets were sold abroad, making the money difficult to trace.
- Shubham received a commission in cryptocurrency for each transaction.
Police say this method allowed the network to bypass traditional financial checkpoints and move money across borders instantly.
Suspect Tried to Destroy Evidence After Accomplice’s Arrest
After learning of Singh’s arrest, Shubham attempted to destroy crucial evidence by burning the cheque book and SIM card associated with the Belcrest account. Despite this, police recovered his mobile phone, containing key chats, logs, and transaction details with foreign handlers.
Investigators have also identified six additional fake companies linked to the same network.
Probe Expands as Police Track Foreign Handler and More Associates
Delhi Police are now tracing other members involved in the cyber-laundering ring and working to identify the overseas handler who coordinated the movement of funds.
Officials say the case highlights how Chinese apps, fake companies, and cryptocurrency are increasingly being used to launder cybercrime proceeds in India.
Cybersecurity
From Gujarat to Myanmar: ‘The Ghost’ Unmasked — Inside an International Cyber Slavery Racket
Ahmedabad / Gandhinagar: Gujarat Police have exposed one of the most organized international cyber-trafficking networks in South and Southeast Asia, centered on 29-year-old Nilesh Purohit, also known as Neel or “The Ghost.” Purohit is accused of orchestrating a transnational pipeline that lured job seekers and forced them into cyber-fraud camps abroad.
The operation reportedly affected over 500 victims in under two years, spanning India, Pakistan, China, Myanmar, Cambodia, Vietnam, and Thailand.
Airport Arrest Prevents Escape
On November 16, 2025, Gujarat Police intercepted Purohit at Sardar Vallabhbhai Patel International Airport in Ahmedabad as he attempted to flee to Malaysia. Officials say that even a few minutes’ delay could have allowed him to evade capture, earning him the moniker “The Ghost.”
Purohit faces five FIRs across Gujarat, Maharashtra, and West Bengal, with charges including human trafficking, cheating, and cybercrime. He has been remanded to Sabarmati Central Jail, and the CBI has opened investigations into his role in multiple international cyber-slavery cases.
Building a Transnational Cyber Empire
Investigators say Purohit’s criminal network expanded rapidly after moving to Dubai in early 2024, where he gained exposure to cyber-crime operations and forged links with Pakistani and Chinese agents. He later traveled to Thailand and Myanmar, operating in hubs like KK Park in Myawaddy Township, known for coercing trafficked workers into online scams.
The Recruitment Model: Recruit, Funnel, Coerce
Purohit reportedly ran a sub-agent network of 126 operatives across India, with connections to over 30 Pakistani agents and 100+ foreign companies. Victims were recruited with promises of legitimate jobs abroad and transported via a route: Bangkok → Tak (Thailand) → jungle trek → Moei/Thaungyin River → Myawaddy, Myanmar.
Victims were primarily sourced through WhatsApp, Telegram, Facebook, and Instagram, often reinforced by word-of-mouth in smaller towns.
Financial Mechanics: High Earnings and Crypto Transfers
For each victim trafficked, Purohit allegedly earned ₹1.76 lakh to ₹3.96 lakh, using mule bank accounts and multiple cryptocurrency wallets (including Binance) to obscure the financial trail. These transfers corresponded with increased recruitment activity from October 2024 onward.
Inside KK Park: Contracts, Coercion, and Cyber-Fraud Operations
At the camps, victims were forced to sign two-year contracts with early-exit penalties of ₹3.5–₹5 lakh. Those resisting faced physical and psychological abuse. Tasks included phishing, crypto scams, Ponzi schemes, investment fraud, and romance scams, targeting individuals worldwide.
Several victims remain too traumatized to report incidents, prompting authorities to file FIRs on behalf of the State in some cases.
Breaking the Chain: Sub-Agents Lead to Purohit
Intelligence gathered in November led to arrests of sub-agents Hitesh Arjan Somaiya (Porbandar) and Sonal Faldu (Junagadh), both of whom identified Purohit as their handler. At least 22 youths from Gujarat have been linked directly to his trafficking operations, with investigations ongoing in other states.
Repatriations and Regional Efforts
Coordinated operations between India, Thailand, and Myanmar have facilitated the repatriation of over 4,000 Indian citizens from scam camps. Myanmar authorities, under international pressure, have conducted repeated crackdowns, though many trafficked individuals fled during raids.
Policy and Enforcement Challenges Ahead
The case highlights the growing complexity of borderless cybercrime, social-media-based recruitment, and crypto-monetized human trafficking. Authorities emphasize the need for cross-border cooperation to dismantle both the supply and demand sides of these networks.
A senior officer remarked:
“This isn’t just cybercrime; it is the most predatory face of modern human trafficking, powered by the internet and monetized through crypto.”
Agricultural Institutions
Twin Data Wipe at ICAR: Official Records Erased, Backups Lost Too
ew Delhi: A startling twin data-wipe incident at the Indian Council of Agricultural Research (ICAR) and its recruitment body, the Agricultural Scientists Recruitment Board (ASRB), has triggered serious concerns over systemic vulnerabilities, potential insider involvement and the possibility of a larger cover-up. Sensitive data vanished first from ICAR’s primary server in New Delhi in February, and within days, an identical wipe-out occurred in the backup system stored at the Disaster Recovery Centre (DRC) in Hyderabad.
Despite clear government protocols, the institution reported the matter late, refrained from issuing any detailed official statement, and initiated formal inquiry procedures only after weeks of delay — developments that have fuelled suspicion that this was more than a routine cybersecurity lapse.
How the ICAR–ASRB Data Disappeared
According to officials familiar with the matter, the first indications of a breach surfaced in early February, when recruitment and evaluation documents maintained by the ASRB became inaccessible. At first, the disruption was assumed to be a temporary technical fault. But preliminary checks quickly revealed that several key files had been erased from the Delhi server.
What deepened the crisis was the discovery, days later, that the Hyderabad DRC — which is meant to act as the final safeguard against system failure — had an identical set of deletions. The simultaneous loss of primary and backup datasets is seen by cybersecurity professionals as highly unusual and extremely difficult to execute without deliberate intervention.
Experts point out that such matching patterns of deletion are not characteristic of common system errors or random glitches. The incident, they say, points either to a deep-level targeted cyberattack or to internal interference by an individual with high-level administrative access.
What Data Went Missing
The data erased from the ICAR–ASRB ecosystem covered several critical operational functions, including:
- Recruitment applications and candidate records
- Eligibility assessments, evaluation sheets and interview marks
- Key documents related to research projects
- Vigilance and disciplinary records
- Internal communication logs and administrative files
These records form the backbone of ICAR’s recruitment, research oversight and institutional governance framework. Their disappearance raises questions not only about the integrity of ongoing processes, but also about past selections, assessments and project monitoring.
Silence From India’s Top Agricultural Research Body
One of the most contentious aspects of the episode has been ICAR’s muted response. Despite the scale of the incident, the institution did not issue an immediate public statement. Sources indicate that the mandatory reporting to central cybersecurity agencies was also delayed, in violation of standard protocols that require immediate notification in cases of data breach or deletion.
Experts call this delay a “serious procedural lapse.”
According to a senior cybersecurity analyst:
“When both primary and backup servers show identical data loss, it is a clear red flag. Such a situation warrants instant escalation and a coordinated response. ICAR’s slow and guarded reaction is unusual for an incident of this magnitude.”
Delays, Missing Logs and Fear of a Cover-up
By March, the pattern of the deletions had become clearer, but the formation of a formal inquiry committee within ICAR reportedly took longer than expected. Meanwhile, several essential system logs — crucial for forensic examination — were not preserved in time, weakening the prospects of a full technical audit.
These lapses have intensified concerns among experts that the data erasure may not have been accidental. Some believe the deletions may have been intended to remove sensitive information related to recruitments, evaluations or vigilance matters. While no official confirmation has been provided, the possibility of insider involvement remains open.
Is the Cyberattack Angle Still Valid?
Technical teams have not ruled out the possibility of an external cyberattack. However, they have found no clear evidence of widespread intrusion, ransomware signatures or system compromise typically associated with major cyber offensives.
Even so, some specialists believe that if a cyberattack did occur, it would have been highly sophisticated and specifically designed to target selected records without triggering large-scale alerts.
What Next?
The twin data wipe has exposed glaring weaknesses in the cybersecurity and administrative oversight mechanisms of one of India’s most critical research institutions. As ICAR plays a central role in shaping agricultural policy, research and human-resource capacity, the loss of such critical data is expected to have long-term implications.
Calls for a high-level, independent investigation are growing. Experts emphasize that unless ICAR provides a transparent account and preserves all remaining digital evidence, questions over whether this was a cyber breach or an orchestrated clean-up will continue to loom.
-
Business2 years agoPot Odor Does Not Justify Probable Cause for Vehicle Searches, Minnesota Court Affirms
-
Business2 years agoNew Mexico cannabis operator fined, loses license for alleged BioTrack fraud
-
Business2 years agoAlabama to make another attempt Dec. 1 to award medical cannabis licenses
-
Business2 years agoWashington State Pays Out $9.4 Million in Refunds Relating to Drug Convictions
-
Business2 years agoMarijuana companies suing US attorney general in federal prohibition challenge
-
Business2 years agoLegal Marijuana Handed A Nothing Burger From NY State
-
Business2 years agoCan Cannabis Help Seasonal Depression
-
Blogs2 years agoCannabis Art Is Flourishing On Etsy
