Skip to content

Jamtara Cybercrime syndicate busted, ₹11Cr fraud uncovered

  • by
  • 3 min read

A sophisticated cybercrime network exploiting fake mobile apps to steal sensitive data and siphon money from unsuspecting victims has been dismantled in Jamtara. The criminals developed malicious APKs mimicking government schemes and banking apps, targeting more than 2700 victims across India in fraud exceeding ₹11 crores.

The operation was led by Superintendent of Police Dr Ehtesham Waquarib (IPS), along with ASP (P) Raghvendra Verma, DSP Chandra Shekhar, and Inspector Jayant Tirkey from the cyber police station. After a month-long pursuit, six individuals — Md. Mahboob Alam (alias D.K. Boss), Safauddin Ansari, Md. Aarif Ansari, Jashim Ansari, Sk. Belal, and Ajay Mandal — were arrested.

Recognising the gravity of the case, the Jamtara Police sought assistance from the Jharkhand CID Tech Support Team and the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs, reports The420.

All criminals hail from Giridh and Jamtara, four having a prior cybercrime history.

Police recovered a significant cache of evidence during the raid:

  • 14 mobile phones, 23 SIM cards, 10 ATM cards
  • ₹1,08,800 in cash
  • 1 laptop, 1 DSLR camera, 1 drone
  • 2 four-wheelers

Additionally, over 100 malicious APKs were found on the suspects’ devices, along with a centralised control panel that displayed real-time SMS data from victims’ phones.

What is an APK file and why are they used? | Candid.Technology
Scammers deployed malicious APKs on victims’ devices to exfiltrate sensitive data.

The syndicate’s operations were vast and well-organised. A staggering 2700 victims’ data, including over 7 lakh SMS messages containing sensitive information like WhatsApp OTPs and banking credentials, was recovered.

The syndicate specialised in creating malicious Android applications (APK) masquerading as government welfare schemes such as ‘PM Kisan Yojana.apk,’ and ‘PM Fasal Bima Yojana.apk,’ along with apps mimicking official banking platforms of institutions like the State Bank of India, Canara Bank, and Punjab National Bank.

These fake apps were distributed to unsuspecting victims via WhatsApp, leading to the hacking of their devices.

Victims who installed these APKs unknowingly exposed their phones to data theft, including bank account details, OTPs, and personal information such as dates of birth. This data was then exploited to conduct unauthorised financial transactions.

The gang also sold these malicious APks to other cybercriminals for Rs 20,000 to 25,000 each, highlighting an emerging ‘Cybercrime as a Service’ model.

The investigation revealed the criminals were experts in Android software development and had leveraged AI tools like ChatGPT to refine their malware. Their operations also had inter-state implications, with connections to 415 cybercrime complaints nationwide.

Authorities have urged people to verify the authenticity of applications and avoid clicking on suspicious links.

In the News: Subaru’s Starlink security flaw exposes cars to location tracking

Kumar Hemant

Kumar Hemant

Deputy Editor at Candid.Technology. Hemant writes at the intersection of tech and culture and has a keen interest in science, social issues and international relations. You can contact him here: kumarhemant@pm.me

>