RUDRAPUR: Police in Uttarakhand have revealed a vast online gaming fraud operation stretching from Rudrapur to Dubai. This scheme has ensnared thousands of individuals, leading to the generation of several crores in illegal profits. Authorities believe the fraudulent operation utilized deceptive gaming applications, cloned call centers, and remotely accessed devices to illegally extract money from users throughout India.
A Fraud Built Behind the Façade of Online Gaming
During a raid in Rudrapur last week, law enforcement officials anticipated discovering a minor phone scam. However, they stumbled upon what has been classified as a significant link in an international fraud network leveraging online gaming applications as bait. Police reports suggest that this scheme attracted unsuspecting participants with the allure of small winnings, ranging from ₹500 to ₹600 per attempt. Once users were reeled in, they were persuaded to invest larger sums, which were then siphoned off through bank transfers and mule accounts.
At the heart of this operation is Manjeet Singh, locally known as Sonu. He reportedly returned to India from Dubai, where he had experience working in a call center. Investigators believe that this experience provided him with the technical knowledge and insights necessary to establish a similar fraudulent system in India. Preliminary investigations indicate that this group may have scammed around 50,000 individuals in just the last three months, resulting in approximate losses of ₹5.54 crore.
A Network Extending Beyond District Borders
Police records reveal that Manjeet and his co-conspirators set up a fake call center in Rudrapur, utilizing rented spaces as their operational base. They employed tailored software, auto-dialing systems, and spoofed phone numbers to initiate contact with potential victims. Those who expressed interest in attractive gaming offers were incrementally guided to deposit increasing amounts into accounts managed by the gang.
Inspector Jayashankar Singh noted that the investigation gained momentum when authorities detained Amritpal, a local man linked to three separate cases of online cheating. During interrogation, Amritpal identified Manjeet as the mastermind behind the operation, detailing how Manjeet’s stint in Dubai enabled him to replicate the fraudulent model back home.
As law enforcement prepared to conduct coordinated raids, they found that the fraud network had already expanded across multiple states. Arrests included individuals from Gujarat, Madhya Pradesh, and Nepal, all of whom had reportedly convened in Rudrapur to participate in the operation.
Technology as the Engine of Deception
Investigators assert that the fraudsters leveraged a combination of illicit software and remote access tools. Many victims were misled into sharing their banking information or installing applications that allowed the operators to gain control of their phones. Once access was granted, the gang allegedly transferred funds directly from the victims’ accounts.
To maintain an appearance of legitimacy, the fraudsters orchestrated a series of “wins” for new users on gaming apps rigged to produce manipulated outcomes. Police theorize that this psychological tactic—offering initial small successes—fueled user trust in the platform, encouraging them to deposit larger sums.
During the raids, authorities confiscated 13 mobile devices, 13 laptops, and multiple SIM cards linked to false identities. Officers believe that the seized technology contains information that could uncover additional aspects of the operation, including communication logs with accomplices located in Dubai.
Tracing the Links Abroad as Arrests Mount
The connection to Dubai has emerged as a crucial element of the investigation. According to Superintendent of Police Abhishek Yadav, several suspects maintained regular lines of communication with handlers based in Dubai who allegedly directed operations and supplied updated fraud scripts. Authorities suggest that Manjeet has begun wiring a portion of the criminal proceeds back to Dubai, but the methods of these transactions are still under examination.
As the investigation evolves, six network members have been arrested and face charges associated with cybercrime, cheating, and fraud. Law enforcement anticipates more arrests will follow once thorough forensic analysis of seized devices is completed and banking trails are fully reconstructed.


