Pune Cyber Police Uncover ₹10.74 Crore Digital Arrest Fraud, Arrest Solapur Suspect
An 82-year-old man from Pune fell victim to a sophisticated cyber fraud scheme that exploited his fear of authority. According to the Pune Cyber Police, fraudsters impersonating officials from the Telecom Regulatory Authority of India (TRAI) and the Central Bureau of Investigation (CBI) falsely accused him of being linked to a money-laundering case involving his Canara Bank account. The scammers utilized video calls to create a fake courtroom scenario, intimidating the victim into compliance.
Over the course of several days, from January 23 to January 31, 2026, the victim was coerced into transferring his life savings into various bank accounts controlled by the fraud network. By the end of this elaborate deception, he had lost a staggering ₹10.74 crore.
The Mechanics of Digital Arrest Fraud
Cybercrime investigators in India have increasingly labeled this type of fraud as “digital arrest” fraud. This method does not rely on legal processes; instead, it employs a theatrical display of intimidation. The fraudsters utilize impersonation, authoritative language, and visual aids—such as video calls and staged legal proceedings—to manipulate their victims into acting against their better judgment.
The psychological tactics employed in this scheme exploit individuals’ fears of legal repercussions and their unfamiliarity with enforcement procedures. This combination of intimidation and authority leads to a rapid breakdown of resistance, making victims more susceptible to compliance.
The Arrest in Solapur
The investigation took a significant turn when Pune Cyber Police arrested Amar Shivaji Attargi, a 24-year-old resident of the Modikhana area in Solapur. Authorities allege that Attargi provided one of the bank accounts used in the fraudulent transactions and that funds linked to the victim’s transfers passed through his account.
Attargi’s role appears to be more embedded within the financial structure of the fraud rather than at the forefront where threats were made. He allegedly withdrew funds through cheque transactions, indicating that the operation relied on intermediaries willing to facilitate banking access after the victim had been coerced into transferring money.
Following the Money Trail
The investigation has progressed through meticulous examination of banking records alongside digital evidence. On January 30, the victim transferred ₹75 lakh to a Yes Bank account. Subsequently, ₹6.5 lakh was moved to three accounts at the Bank of Maharashtra. These transactions enabled investigators to identify connections to individuals involved in routing or withdrawing the illicit proceeds.
Earlier in the investigation, cyber police apprehended Harshad Subhash Dhantole and Samarth Suresh Deshmukh, both from Karvenagar, on February 22, 2026. They were accused of withdrawing money from mule accounts via ATMs. Investigators revealed that Dhantole handed over cash to another suspect, Rohan Jadhav of Sangvi, who remains at large.
The details of the case illustrate a complex web of fraud rather than a singular incident. Each stage of the operation appears designed to fragment the trail: initial transfers, movement across accounts, cash withdrawals, and handoffs. This fragmentation serves not only for operational convenience but also for insulation, complicating the tracing of responsibility for investigators.
A Scam Bigger Than One Victim
The investigation revealed a banking trail connected to an astonishing 5,436 bank accounts. This figure indicates an operation far more extensive than a single victim interaction, suggesting a highly organized network rather than isolated acts of impersonation.
So far, investigators have managed to freeze ₹1.34 crore across accounts related to the fraud. While this amount represents only a fraction of the total allegedly siphoned, it highlights a significant challenge in such cases: the speed at which cybercrime networks operate. Once victims transfer money under duress, the networks often disperse the funds across numerous accounts in rapid succession, limiting the time available for police and banks to intervene.
Authorities have reiterated that “digital arrest” lacks legal validity in India. This serves as a crucial warning in a fraud landscape where criminals increasingly mimic the language and demeanor of state officials. The persistence of such schemes underscores that the effectiveness of the scam lies not in legal legitimacy but in psychological manipulation. It capitalizes on fears of criminal implication and the tendency to comply when demands are framed within institutional authority.
In Pune, this dynamic has culminated in a case involving crores of rupees, multiple arrests, and thousands of linked accounts. The investigation reveals not merely a deception executed through calls and screens, but a well-organized financial mechanism designed to convert panic into profit.
For further details, refer to the reporting by the420.in.


