<?xml version="1.0" encoding="utf-8"?>        <rss version="2.0"
            xmlns:content="http://purl.org/rss/1.0/modules/content/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:atom="http://www.w3.org/2005/Atom">
            <channel>
                <atom:link href="https://english.dainikjagranmpcg.com/raipur-cyber-fraud/tag-13216" rel="self" type="application/rss+xml" />
                <generator>Dainik Jagran English RSS Feed Generator</generator>
                <title>Raipur Cyber Fraud - Dainik Jagran English</title>
                <link>https://english.dainikjagranmpcg.com/tag/13216/rss</link>
                <description>Raipur Cyber Fraud RSS Feed</description>
                
                            <item>
                <title>Raipur Digital Arrest Scam: Cyber Fraud Gang Busted in ₹1.25 Crore Cheating Case</title>
                                    <description><![CDATA[<p><strong>Raipur police arrests three accused in a digital arrest scam involving ₹1.25 crore fraud against a retired doctor using fake money laundering threats.</strong></p>]]></description>
                
                                    <content:encoded><![CDATA[<a href="https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-digital-arrest-scam-cyber-fraud-gang-busted-in-%E2%82%B9125/article-18457"><img src="https://english.dainikjagranmpcg.com/media/400/2026-05/raipur-digital-arrest-scam.jpg" alt=""></a><br /><p style="text-align:justify;">Raipur police have uncovered a major Raipur digital arrest scam, arresting three members of an interstate cyber fraud gang accused of cheating a retired veterinary doctor of ₹1.25 crore. The accused were traced to Delhi and Karnataka before being brought to Chhattisgarh for further investigation. Officials confirmed that one more accused had already been arrested earlier from Haryana, marking a significant breakthrough in the case.</p>
<h5 style="text-align:justify;"><strong>Fake Legal Threats</strong></h5>
<p style="text-align:justify;">The victim, Dr. Sapan Kumar, was targeted through a well-planned cyber fraud operation. The accused allegedly called him posing as law enforcement officials and claimed that his credit card had been linked to a money laundering investigation. The fraudsters used fear and urgency to manipulate the victim, repeatedly warning him of arrest if he failed to cooperate. This psychological pressure formed the core strategy of the Raipur digital arrest scam.</p>
<h5 style="text-align:justify;"><strong>Digital Custody Trap</strong></h5>
<p style="text-align:justify;">Investigators revealed that the victim was kept under what the accused described as “digital arrest” for nearly 24 hours a day. Through continuous video calls on messaging platforms, he was isolated and instructed not to contact anyone. The accused allegedly monitored his every move digitally and prevented him from seeking help. This created a controlled environment where the victim was unable to verify the claims made by the fraudsters.</p>
<h5 style="text-align:justify;"><strong>Massive Financial Loss</strong></h5>
<p style="text-align:justify;">Under sustained pressure, the retired doctor transferred approximately ₹1.25 crore into multiple bank accounts controlled by the gang. In one instance, he was even forced to break his fixed deposits to arrange funds. Reports suggest that on January 16, the accused specifically demanded ₹55 lakh into a separate account, pushing the victim to liquidate his savings. The total fraudulent transfers crossed ₹1.28 crore in related transactions.</p>
<h5 style="text-align:justify;"><strong>Organized Cyber Network</strong></h5>
<p style="text-align:justify;">Police investigations revealed that the gang operated using at least 18 mule bank accounts, which were used to route illegal transactions. These accounts collectively handled transactions worth over ₹10.76 crore. Authorities further found that the same accounts were linked to multiple cyber complaints registered across 17 states in India. This indicated the presence of a wide and structured cybercrime network operating at the national level.</p>
<h5 style="text-align:justify;"><strong>Multiple Scam Methods</strong></h5>
<p style="text-align:justify;">The arrested accused were reportedly involved in several types of cyber fraud beyond the Raipur digital arrest scam. These included fake job offers, OTP theft, phishing links, cryptocurrency scams, SIM swapping, OLX fraud, hotel booking fraud, and fake investment schemes. Police believe the gang operated like a cyber syndicate, adapting different fraud methods depending on the victim profile and opportunity.</p>
<h5 style="text-align:justify;"><strong>Investigation Trail</strong></h5>
<p style="text-align:justify;">The case began after the victim filed a complaint at the local police station in Raipur’s Vidhansabha area. Cyber cell teams immediately launched a technical investigation, tracking mobile numbers, IP logs, and financial transactions. The breakthrough came when investigators traced one accused to Haryana, leading to his arrest. Subsequent interrogation provided critical leads that helped locate and arrest the remaining suspects in Delhi and Karnataka.</p>
<h5 style="text-align:justify;"><strong>Psychological Manipulation</strong></h5>
<p style="text-align:justify;">Officials highlighted that the gang relied heavily on psychological intimidation techniques. By posing as government officials from agencies like police or crime branches, they created fear and confusion. Victims were often told that they were under surveillance and must comply immediately to avoid legal action. This tactic has become increasingly common in modern cyber fraud cases across India.</p>
<h5 style="text-align:justify;"><strong>Police Advisory</strong></h5>
<p style="text-align:justify;">Authorities have urged citizens not to panic in case of such calls and to verify claims independently. Police clarified that no agency conducts arrests or investigations through video calls or demands money transfers. The public has been advised to immediately report suspicious calls to the national cyber helpline number 1930 or nearest police station.</p>
<h5 style="text-align:justify;"><strong>Growing Cyber Threat</strong></h5>
<p style="text-align:justify;">The Raipur digital arrest scam reflects the rising sophistication of cybercrime networks targeting vulnerable individuals, especially retired professionals and senior citizens. The use of technology to create fake legal pressure is emerging as a major concern for law enforcement agencies. Experts believe that awareness and quick reporting are key to preventing financial losses in such cases.</p>
<p style="text-align:justify;">-----------</p>]]></content:encoded>
                
                                                            <category>States</category>
                                            <category>Chhattisgarh</category>
                                    

                <link>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-digital-arrest-scam-cyber-fraud-gang-busted-in-%E2%82%B9125/article-18457</link>
                <guid>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-digital-arrest-scam-cyber-fraud-gang-busted-in-%E2%82%B9125/article-18457</guid>
                <pubDate>Sat, 16 May 2026 10:05:20 +0530</pubDate>
                                    <enclosure
                        url="https://english.dainikjagranmpcg.com/media/2026-05/raipur-digital-arrest-scam.jpg"                         length="164738"                         type="image/jpeg"  />
                
                                    <dc:creator><![CDATA[Vaishnavi]]></dc:creator>
                            </item>
            <item>
                <title>Cyber Fraud in Raipur, Businessman Loses ₹7 Lakh in Fake Electricity Meter Scam </title>
                                    <description><![CDATA[<p>Raipur electricity meter scam cyber fraud costs trader over ₹7 lakh after fake official sends phishing WhatsApp link and hacks mobile.</p>]]></description>
                
                                    <content:encoded><![CDATA[<a href="https://english.dainikjagranmpcg.com/states/chhattisgarh/cyber-fraud-in-raipur-businessman-loses-%E2%82%B97-lakh-in-fake/article-16672"><img src="https://english.dainikjagranmpcg.com/media/400/2026-04/raipur-cyber-fraud-electricity-meter-scam.jpg" alt=""></a><br /><p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">A shocking case of cyber fraud has surfaced in Raipur, Chhattisgarh, where a local businessman was tricked into losing his hard-earned money through a cleverly designed digital scam involving impersonation of electricity department officials.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">Background of the Victim</span></strong></p>
<p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">The victim, Ashish Bhai Desai, a laminates trader residing in the Devendra Nagar area, had recently applied for a new electricity meter at the Daladal Sivi-Mowa electricity office. This routine application process became the starting point of a well-planned cyber trap.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">How the Scam Was Initiated</span></strong></p>
<p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">A few days after the application, the businessman received a phone call from an unknown number. The caller introduced himself as an employee of the electricity department and claimed to assist in completing the meter installation process. To build trust, he instructed the victim to make a small online payment of just ₹13 as a procedural fee.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">WhatsApp Link Trap</span></strong></p>
<p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">After the initial conversation, the victim was contacted again via WhatsApp. He was sent a link that appeared authentic and even displayed the logo of the electricity department. Believing it to be part of a government procedure, he clicked on the link without suspicion. This single action gave the attackers unauthorized access to his mobile device.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">Unauthorized Access and Fund Transfer</span></strong></p>
<p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">Once the phone was compromised, the cybercriminals accessed banking applications linked to the device. They executed multiple transactions from two different bank accounts. A total of ₹6,03,472 was withdrawn from a Bank of Maharashtra account in six installments, while ₹99,000 was taken from an HDFC Bank account. Overall, ₹7,02,472 was siphoned off through eight separate transactions.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">How the Fraud Was Discovered</span></strong></p>
<p class="MsoNormal"><span style="font-size:12pt;line-height:115%;">The scam came to light when the victim began receiving continuous alerts of money deductions from his bank accounts. Realizing he had been cheated, he immediately approached the police and filed a complaint.</span></p>
<p class="MsoNormal"><strong><span style="font-size:12pt;line-height:115%;">Police Action and Advisory</span></strong></p>
<p><span style="font-size:12pt;line-height:115%;font-family:Calibri, 'sans-serif';">Police officials have registered a case and started an investigation to trace the culprits. Authorities have also issued a public warning, advising citizens not to trust unknown calls or click on suspicious links. They emphasized that government departments never demand payments or share official procedures through unsecured messaging links.</span></p>]]></content:encoded>
                
                                                            <category>Chhattisgarh</category>
                                    

                <link>https://english.dainikjagranmpcg.com/states/chhattisgarh/cyber-fraud-in-raipur-businessman-loses-%E2%82%B97-lakh-in-fake/article-16672</link>
                <guid>https://english.dainikjagranmpcg.com/states/chhattisgarh/cyber-fraud-in-raipur-businessman-loses-%E2%82%B97-lakh-in-fake/article-16672</guid>
                <pubDate>Wed, 08 Apr 2026 18:46:50 +0530</pubDate>
                                    <enclosure
                        url="https://english.dainikjagranmpcg.com/media/2026-04/raipur-cyber-fraud-electricity-meter-scam.jpg"                         length="107609"                         type="image/jpeg"  />
                
                                    <dc:creator><![CDATA[ROHIT]]></dc:creator>
                            </item>
            <item>
                <title>Raipur Becomes New Jamtara: Gujarat-Based Mastermind Behind Fake Call Centre Scam Targeting US Citizens — 42 Arrested</title>
                                    <description><![CDATA[<p><strong>Raipur Police bust 3 illegal call centres run by Gujarat masterminds duping US citizens. 42 arrested, ₹16.5L in devices seized. Here's how the 5-step scam worked.</strong></p>]]></description>
                
                                    <content:encoded><![CDATA[<a href="https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-becomes-new-jamtara-gujarat-based-mastermind-behind-fake-call-centre/article-16092"><img src="https://english.dainikjagranmpcg.com/media/400/2026-03/raipur-becomes-new-jamtara-gujarat-based-mastermind-behind-fake-call.jpg" alt=""></a><br /><p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Raipur has been quietly earning a dangerous reputation. Just as Jamtara in Jharkhand became synonymous with phone scams a decade ago, Chhattisgarh's capital is now at the centre of a sophisticated, international cyber fraud operation — masterminded from Ahmedabad, Gujarat, and executed floor by floor in two Raipur commercial complexes.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">In a major overnight operation on March 26, the Anti Crime and Cyber Unit of Raipur Police raided three illegal call centres operating from Pithaliya Complex in Subhash Nagar and Anjani Tower in New Rajendra Nagar. A total of 42 accused were arrested. Seized from their possession were 67 mobile phones, 18 laptops, 28 computer sets, and 3 Wi-Fi routers — devices collectively valued at over ₹16.53 lakh.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">The Mastermind Sits in Ahmedabad</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">This was no fly-by-night operation. According to police, the entire network was controlled by masterminds based in Ahmedabad, Gujarat, who recruited supervisors on a monthly salary of ₹30,000 plus a 2% commission on every successful fraud. These supervisors in turn hired agents at ₹15,000 per month to make calls to the United States of America.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Three supervisors — identified as Rohit Yadav (alias Anil Kumar Yadav), Gaurav Yadav, and Saurabh Singh — ran the day-to-day operations across the three call centres. The masterminds, police say, remain at large and a hunt is on.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">How the 5-Step Scam Worked</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">What makes this case remarkable is the clinical, assembly-line precision of the fraud. Police laid out a five-stage process during interrogation:</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Step 1 — Target Acquisition:</strong> Employees sourced data of Americans who had applied for bank loans via WhatsApp and Telegram groups. Using scripted English prompts displayed on screen, they contacted these targets via internet calling apps, posing as loan officers.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Step 2 — Trust Building:</strong> Once a target expressed interest in a loan, agents collected their full bank account details and passed them up the chain. A "deposit team" then told the victim their credit score (CIBIL equivalent) was poor but could be fixed — and asked them to wait for a callback.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Step 3 — Fake Cheque Deposit:</strong> A technical group, reportedly operating from China, used the victim's account details to prepare a cloned cheque and deposit it into the victim's account. Foreign banks, following standard short-term credit practices, immediately credited small amounts — typically $100 — pending a 48-hour verification. The scam exploited this window.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Step 4 — The Hook:</strong> The calling group rang the victim back: "Your credit score has been fixed. We deposited $100 into your account to prove it — please check." The victim verified the amount, delighted. The gang then said: "That money belongs to our company. Please return it via gift card."</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Step 5 — Cash Out and Hawala:</strong> Victims willingly purchased Apple, Google, Amazon, Crafin, or other gift cards and shared the card codes with the gang. A dedicated "redemption group" — again reportedly linked to China — instantly converted these cards into cash. The money then travelled back to the Ahmedabad masterminds via hawala channels.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The China-based technical group reportedly took a 10% cut of every successful fraud for their cloning and cash-out services.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">'Digital Arrest' Used to Terrorise Victims</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Beyond the loan scam, police also found fake arrest warrants prepared on the computers at both locations. These were used to terrorise victims who hesitated or asked questions — a tactic known as "digital arrest," in which fraudsters impersonate law enforcement officers and threaten immediate legal action unless payments are made immediately.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Prime Minister Modi had publicly warned about digital arrest scams in a Mann Ki Baat address last year. That this tactic was being actively deployed from Raipur underlines how widespread the problem has become.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">Who Are the Accused?</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The 42 arrested span multiple states. While the supervisors and several key operatives hail from Ahmedabad and other parts of Gujarat, rank-and-file employees were recruited from Uttar Pradesh (Prayagraj, Itawa, Deoria), Bihar, Punjab, Haryana, Maharashtra, Meghalaya, and Chhattisgarh itself. Most are between 19 and 35 years old.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">During interrogation, the accused admitted they were fully aware the activities were illegal but were drawn in by the combination of a fixed salary and performance-based incentives tied to fraud amounts.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Cases have been registered under multiple sections of the Bharatiya Nyaya Sanhita (BNS) — including sections 61(2), 112(2), 316(2), 318(4), 319(2), 336(3), 337, 338, and 340(2) — as well as Sections 66(C) and 66(D) of the Information Technology Act.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">A Warning for Job Seekers</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">This case carries a message beyond crime reporting. Many of the accused were young people from modest backgrounds, recruited with the promise of a "call centre job" in Raipur — with no clear explanation of who they would be calling or why. Several were living in rented flats together, clearly housed and managed by their handlers.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">At a time when youth unemployment remains high and call centre work is seen as respectable urban employment, organised crime networks are actively exploiting that desperation. If a job offers unusually high commissions for making calls to foreigners with scripted English dialogues — and asks no questions — it almost certainly is not legitimate.</p>
<hr class="border-border-200 border-t-0.5 my-3 mx-1.5" />
<h3 class="text-text-100 mt-2 -mb-1 text-base font-bold">The Ahmedabad-Raipur-China Triangle</h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">What Raipur Police have uncovered is not just a local crime story. It is a transnational cyber fraud pipeline with tentacles stretching from Ahmedabad to Raipur to the United States — with China-based technical operators providing the cloning and cash-out infrastructure. The masterminds remain free. The investigation is ongoing.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Raipur has enough going for it — as a growing capital city in the heart of India — to not want this kind of notoriety. The question now is whether law enforcement can follow the money all the way back to Ahmedabad, and beyond.</p>]]></content:encoded>
                
                                                            <category>States</category>
                                            <category>Chhattisgarh</category>
                                    

                <link>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-becomes-new-jamtara-gujarat-based-mastermind-behind-fake-call-centre/article-16092</link>
                <guid>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-becomes-new-jamtara-gujarat-based-mastermind-behind-fake-call-centre/article-16092</guid>
                <pubDate>Fri, 27 Mar 2026 13:48:55 +0530</pubDate>
                                    <enclosure
                        url="https://english.dainikjagranmpcg.com/media/2026-03/raipur-becomes-new-jamtara-gujarat-based-mastermind-behind-fake-call.jpg"                         length="140539"                         type="image/jpeg"  />
                
                                    <dc:creator><![CDATA[Nitin Trivedi]]></dc:creator>
                            </item>

            </channel>
        </rss>
        