Tranding

MAJOR SEXTORTION & CYBER FRAUD RACKET BUSTED — CRIMINAL NETWORK SPANNING RAJASTHAN, DELHI, UTTAR PRADESH EXPOSED

Mahesh Dhoundiyal - Delhi
 
? 06 ACCUSED PERSONS INVOLVED IN CYBER FRAUD, BANKING FRAUD AND SEXTORTION RACKET ARRESTED AND 9 PERSONS BOUND DOWN.
? SEVERAL BANK ACCOUNT CREDENTIALS USED FOR ILLICIT FINANCIAL TRANSACTIONS RECOVERED.
? 28 MOBILE PHONES, 30 SIM CARDS, 02 LAPTOPS, 08 CHEQUE BOOKS, 15 DEBIT CARDS RECOVERED.
? SEVERAL VIDEOS AND PHOTOGRAPHS USED TO BLACKMAIL VICTIMS RECOVERED
? MONEY TRAIL OF OVER RS. 5 CR IDENTIFIED
INTRODUCTION 
In a significant breakthrough, the Cyber Cell of the Crime Branch, Delhi Police, has successfully dismantled a sophisticated pan-India cybercrime syndicate involved in large-scale banking frauds. The network operated through multiple verticals, including fake loan call centres and a meticulously orchestrated sextortion racket. This racket comprised social media profile analysts, extortion callers, and individuals impersonating police officers to intimidate victims with false legal threats unless they complied with extortion demands. The crackdown was the result of a meticulously planned operation led by Inspector Manjeet Kumar, under the supervision of ACP Anil Sharma.
 
OPERATION: -
 
On 24th May 2025, credible intelligence was received regarding the movement of a consignment suspected to contain synthetic bank account kits in the New Ashok Nagar area of Delhi. These kits were reportedly being used in various high-tech crimes such as sextortion, cyber fraud, banking scams, debit/credit card cloning, etc.—crimes that have seen a recent surge both in frequency and sophistication.
 
The intelligence indicated that the kits were to be delivered and distributed near the vicinity of Mayur Vihar Phase-1 Extension, New Delhi. Based on the severity of the crimes associated with such kits, an immediate and decisive operational response was formulated. A highly coordinated clean operation was initiated under the leadership of Inspector Manjeet Kumar. The team was composed of the following personnel: SI Parvesh Rathi, SI Jagseer Singh, ASI Kanwar Pal, ASI Mahesh, HC Vipin Kumar, HC Anuj Kumar, HC Rajesh Kumar, HC Vinod, HC Manish Dabas, HC Pankaj, HC Mohit, HC Gaurav, Ct Bijender, Ct Suresh Pal, Ct Ravi Kumar, Ct Sachin and WCt Nisha.
 
The operation resulted in the successful arrest of the following three individuals who were in possession of the consignment of synthetic bank account kits: -
1. Ujjawal Pandey R/o Krishna Nagar, Delhi, Age: 30 years.
2. Gaurav Barua R/o  Trilok Puri, Delhi, Age: 24 years.
3. Yug Sharma R/o Phase-1, Mayur Vihar, Delhi, Age: 19 years. 
 
All three individuals were apprehended with the synthetic bank account kits and other relevant digital and financial paraphernalia which included 
• Pre-activated SIM cards.
• Forged bank documents.
• Debit/credit cards linked to dummy or fraudulent accounts.
• Mobile devices for real-time transaction control.
 
These items collectively formed what is termed a “synthetic financial identity”, allowing cybercriminals to operate untraceable, modular shadow banking systems. By combining communication channels with financial tools, fraudsters could bypass basic KYC and transaction verification mechanisms, enabling seamless control over fraudulent banking activities. Once prepared, these kits were sold to or distributed among cybercrime networks operating across different scams.
 
During the course of a targeted investigation by the Cyber Cell, a raid was conducted at the instance of the accused persons, leading to the unearthing and dismantling of an illegal call center involved in fraudulent bank loan schemes. This fraudulent operation was functioning in the Mundka area of Delhi, where seven individuals were apprehended in connection with the case. 
 
Among the arrested individuals, Dilshad Ali emerged as a key operative. Investigations revealed that Dilshad, along with his associate Amit (resident of Mundka, Delhi, currently absconding), was running a fake bank loan provider call center. Dilshad acted as the team leader, while Amit is identified as the owner of the operation. Amit’s role involved the procurement and facilitation of fraudulent bank accounts and fake SIM cards, which were further handed over to Dilshad for use in the scam.
 
The modus operandi of the call center was to defraud individuals by offering fake bank loans. Initially, tele callers under Dilshad’s direction contacted potential victims, offering them attractive loan deals. Upon gaining the victim's trust, the tele caller would request identification and other personal documents via WhatsApp. The victim was then asked to make a payment through a QR code scanner, under the pretext of file processing fees. After the payment was received, the victim’s follow-up messages and calls were ignored. The fraudsters would then switch off their mobile devices and change their contact numbers, effectively cutting off all communication.
 
Subsequent investigation, further aided by the inputs from arrested individuals, led to another significant raid conducted in the New Ashok Nagar area of Delhi. During this operation, four more accused persons were apprehended, resulting in the exposure and busting of an organized sextortion racket.
 
These individuals employed a deceitful method to lure and exploit victims. Initially, they would send friend requests on Facebook and obtain the victim's mobile number through Facebook Messenger. Subsequently, they would initiate a video call on WhatsApp, during which they would stream pornographic clips, secretly recording the victim’s screen and reactions using screen recording tools. The recorded content was then used to blackmail the victim under threats of publicly circulating the video on social media platforms, thereby coercing them into transferring money.
 
 
PROFILE OF ACCUSED PERSONS:
 
1. Ujjawal Pandey r/o Krishna Nagar, Delhi, age 30 years, completed his education in Kolkata, West Bengal. Ujjawal shifted to Delhi in 2021 and started a cybercafé. Through this venture, he came into contact with individuals involved in cyber fraud. Lured by the prospect of quick money, he began selling and purchasing fake account kits and SIM cards, thereby becoming actively involved in cybercrime operations.
2. Gaurav Barua r/o Trilok Puri, Delhi, age 24 years completed his graduation from IGNOU. He was initially employed at an insurance company where he learned account trading. He was introduced to illegal activities via a contact on Telegram. He was drawn into the network of pre-activated account kit transactions and became a key facilitator, eventually partnering with Ujjawal Pandey. 
3. Yug Sharma r/o Phase-1, Mayur Vihar, Delhi, Age- 18 years, completed his early education in Mayur Vihar, and later studies in Dalhousie, Himachal Pradesh. He is a close friend of Gaurav Barua and assisted in the supply of fake SIM cards and account kits to fraudsters. 
 
4. Dilshad Ali r/o Saraswati Vihar, Delhi, age- 33 years, worked with Kotak Life Insurance initially and then at a call centre in Janakpuri. Dilshad met a person named Amit in Mundka and joined a fraudulent operation that involved duping people under the pretence of providing loans. He became a key operator, running an office that employed multiple tele callers to facilitate the scam. Dilshad is previously involved in in case FIR No. 701/2019 u/s 417/419/420 IPC & 66D IT Act, PS Malad, Maharashtra.
 
5. Saurav r/o Tilak Nagar, Delhi, age- 27 years is a graduate. He worked as a tele caller in Dilshad Ali’s fraudulent office, earning Rs. 9,000/month. He assisted in duping customers by posing as loan service representatives.
6. Pravesh r/o Suleman Nagar, Rohini, Sec-20, Delhi, age- 28 years is 12th pass and a computer literate. He was employed in Dilshad’s office as a tele caller with a salary of Rs. 9,000/month, participating in scamming victims.
7. A r/o Peeragarhi, Delhi, age 18 years. She is 12th pass and a computer literate. She worked with Dilshad as a tele caller, earning Rs. 8,000/month. 
8. Raunak r/o Sultanpuri, Delhi, age- 24 years is 12th pass and a computer literate. He was another employee at Dilshad’s call centre, engaged in tele calling for the fake loan scam. Earned Rs. 8,000/month.
9. D r/o Najafgarh, Nagli Dairy, Delhi, age- 20 years is 12th pass and a computer literate. She worked as a tele caller in the fraudulent call centre, luring victims under the guise of loan assistance.
10. P r/o Nariana Industrial Area, Delhi, age- 24 years is 12th pass and a computer literate. She engaged in fraudulent activities as a tele caller, assisting in misleading loan calls at Dilshad’s office.
11. Jahid r/o District Deeg, Rajasthan, age- 20 years is pursuing graduation (3rd year). After moving to Delhi for studies, Jahid got involved with locals involved in sextortion. He became a leading figure in a sextortion gang, sourcing activated bank account kits through Gaurav and coordinating blackmail operations by capturing compromising videos of victims.
12. Raheesh r/o District Deeg, Rajasthan, age- 21 years is 12th pass. He joined Jahid’s sextortion gang in Delhi and assisted in targeting victims for blackmail.
13. Sohil r/o District Deeg, Rajasthan, age- 18 years is a school dropout. He moved to Delhi for work and joined Jahid’s sextortion gang. 
14. Jayshree r/o Bharatpur, Rajasthan, age- 24 years is a graduate from Alwar University. She is a former employee of SBI BPO, Noida. During unemployment in 2024, Jayshree joined the sextortion gang led by Jahid. She was responsible for making calls and luring victims into compromising situations, which were later used for blackmail.
15. Jaiveer r/o Distt. Alwar Rajasthan, aged 24 years. completed his graduation from Nimrana, and thereafter, started working with a Path Lab, where he collected blood samples. One year back he met Vipin and joined the gang through him.
 
Further investigation is under way.

Mahesh Dhoundiyal - Delhi
3432 50
Share this News:

Comments

Leave a comment

Advertisement Image Advertisement Image Advertisement Image
Get In Touch

National Apartment Akot File Akola Maharashtra - 444001

(+91) 94275 90781

info@thecurrentscenario.in

Follow Us
Our Team

English News Paper

Join Our News
Our Partners
Partner 1
Partner 2
Partner 3
Partner 4
Partner 5