Gaming Fraud Network Connecting Rudrapur and Dubai Exposed: ₹5.54 Crore Lost Through Apps

Published:

spot_img

RUDRAPUR: Police in Uttarakhand have revealed a vast online gaming fraud operation stretching from Rudrapur to Dubai. This scheme has ensnared thousands of individuals, leading to the generation of several crores in illegal profits. Authorities believe the fraudulent operation utilized deceptive gaming applications, cloned call centers, and remotely accessed devices to illegally extract money from users throughout India.

A Fraud Built Behind the Façade of Online Gaming

During a raid in Rudrapur last week, law enforcement officials anticipated discovering a minor phone scam. However, they stumbled upon what has been classified as a significant link in an international fraud network leveraging online gaming applications as bait. Police reports suggest that this scheme attracted unsuspecting participants with the allure of small winnings, ranging from ₹500 to ₹600 per attempt. Once users were reeled in, they were persuaded to invest larger sums, which were then siphoned off through bank transfers and mule accounts.

At the heart of this operation is Manjeet Singh, locally known as Sonu. He reportedly returned to India from Dubai, where he had experience working in a call center. Investigators believe that this experience provided him with the technical knowledge and insights necessary to establish a similar fraudulent system in India. Preliminary investigations indicate that this group may have scammed around 50,000 individuals in just the last three months, resulting in approximate losses of ₹5.54 crore.

A Network Extending Beyond District Borders

Police records reveal that Manjeet and his co-conspirators set up a fake call center in Rudrapur, utilizing rented spaces as their operational base. They employed tailored software, auto-dialing systems, and spoofed phone numbers to initiate contact with potential victims. Those who expressed interest in attractive gaming offers were incrementally guided to deposit increasing amounts into accounts managed by the gang.

Inspector Jayashankar Singh noted that the investigation gained momentum when authorities detained Amritpal, a local man linked to three separate cases of online cheating. During interrogation, Amritpal identified Manjeet as the mastermind behind the operation, detailing how Manjeet’s stint in Dubai enabled him to replicate the fraudulent model back home.

As law enforcement prepared to conduct coordinated raids, they found that the fraud network had already expanded across multiple states. Arrests included individuals from Gujarat, Madhya Pradesh, and Nepal, all of whom had reportedly convened in Rudrapur to participate in the operation.

Technology as the Engine of Deception

Investigators assert that the fraudsters leveraged a combination of illicit software and remote access tools. Many victims were misled into sharing their banking information or installing applications that allowed the operators to gain control of their phones. Once access was granted, the gang allegedly transferred funds directly from the victims’ accounts.

To maintain an appearance of legitimacy, the fraudsters orchestrated a series of “wins” for new users on gaming apps rigged to produce manipulated outcomes. Police theorize that this psychological tactic—offering initial small successes—fueled user trust in the platform, encouraging them to deposit larger sums.

During the raids, authorities confiscated 13 mobile devices, 13 laptops, and multiple SIM cards linked to false identities. Officers believe that the seized technology contains information that could uncover additional aspects of the operation, including communication logs with accomplices located in Dubai.

The connection to Dubai has emerged as a crucial element of the investigation. According to Superintendent of Police Abhishek Yadav, several suspects maintained regular lines of communication with handlers based in Dubai who allegedly directed operations and supplied updated fraud scripts. Authorities suggest that Manjeet has begun wiring a portion of the criminal proceeds back to Dubai, but the methods of these transactions are still under examination.

As the investigation evolves, six network members have been arrested and face charges associated with cybercrime, cheating, and fraud. Law enforcement anticipates more arrests will follow once thorough forensic analysis of seized devices is completed and banking trails are fully reconstructed.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...