Inside a ₹14.85 Crore ‘Digital Arrest’ Scam: How an International Cyber Syndicate Allegedly Targeted a Delhi Couple
What began as a discreet meeting in a modest hotel room in Lucknow on December 25 allegedly culminated in one of Delhi’s most high-value cyber fraud cases in recent months.
Four men—some barely acquainted—assembled at the Gayatri Palace Hotel, setting in motion the final phase of what investigators describe as a meticulously coordinated “digital arrest” scam.
Over the next 12 days, an elderly couple living in South Delhi’s upscale Greater Kailash-II area were allegedly coerced into transferring ₹14.85 crore through a web of deceit involving impersonation, remote-access applications, mule bank accounts, and overseas handlers suspected to be operating from Cambodia and Nepal.
The Modus Operandi
According to the Delhi Police’s Intelligence Fusion and Strategic Operations (IFSO) unit, the accused allegedly relied on malicious APK files installed on their phones.
These applications reportedly granted foreign-based cyber operatives remote control over banking devices and accounts.
Through these channels, the syndicate allegedly manipulated mule accounts—many linked to NGOs—to receive and transfer large sums of money.
The scam involved impersonating officials from agencies such as the police, CBI, customs authorities, and even regulatory bodies to instil fear and urgency in victims.
Arrests Across Three States
Over the past two weeks, the IFSO has arrested seven individuals from Gujarat, Uttar Pradesh, and Odisha.
The accused have been identified as Mahavir Sharma alias Neel (27), Bhupendra alias Atul Mishra (37), Divyang Patel (30), Arun Kumar Tiwari (45), Pradyuman Tiwari (44), Shitole Krutik (31), and Aadesh Singh (36).
Investigators allege that these individuals acted as intermediaries, facilitating the flow of funds into accounts under their control at the direction of handlers abroad.
Police have seized seven mobile phones and cheque books during the investigation.
Building the Network
Police believe the operation began taking shape in early 2025. Neel, a credit card salesman with the State Bank of India in Ahmedabad, was allegedly recruited to source bank accounts for the syndicate.
He reportedly used Telegram to communicate with foreign handlers and sought NGO accounts under the pretext of receiving Corporate Social Responsibility (CSR) donations from overseas clients.
Through this method, he allegedly connected with Divyang Patel, a chartered accountant from Vadodara who ran the Floresta Foundation, a non-profit organisation.
Patel was allegedly promised an 8% commission if he allowed large transfers to pass through his account.
A similar arrangement was allegedly developed in Uttar Pradesh, where Atul Mishra and Aadesh Singh recruited individuals associated with the Shivash Charitable Foundation in Varanasi.
Accounts belonging to Arun Kumar Tiwari and his associate, Pradyuman Tiwari—a priest—were allegedly used as conduits for funds.
Investigators claim that none of the accused actually received the commissions they were promised.
Funds were credited and immediately transferred onward, with the promise of payment deferred.
Targeting the Victims
The victims—Indira Taneja, a 77-year-old retired dentist, and her 81-year-old husband, a former UN official—were allegedly identified after fraudsters made random calls to affluent neighbourhoods to assess financial status.
The scheme reportedly began with a call from someone posing as an official from the Telecom Regulatory Authority of India (TRAI), claiming that a bank account in Indira’s name was linked to a ₹500-crore money laundering case.
She was then allegedly connected to an individual impersonating a Mumbai police officer, who claimed the account had been used to defraud the Defence Ministry.
The intimidation escalated with what police describe as staged video calls, including a fake Supreme Court hearing and an alleged RBI verification process.
Under mounting psychological pressure, the couple allegedly transferred the money in multiple instalments.
Investigators say ₹4 crore was routed to Divyang Patel’s NGO account, while ₹2.10 crore allegedly passed through Arun Kumar Tiwari’s account.
The funds were then allegedly moved out of India through hawala channels.
Investigation and Recovery
The case came to light after the couple approached police on January 10. An FIR was registered, prompting a multi-state probe led by ACP Prem Khanduri and Sub-Inspector Raj Kiran.
So far, authorities have frozen approximately ₹1.9 crore. However, officials estimate that only ₹2 to ₹2.5 crore of the defrauded amount remains within the formal banking system.
Police admit that tracing the money trail has been challenging.
Mule account holders often claim limited knowledge of the broader conspiracy, and communications with foreign handlers typically occur via encrypted platforms such as Telegram.
A Growing Concern
The case underscores the increasing sophistication of cyber fraud operations, where psychological manipulation, technological exploitation, and international coordination intersect.
Law enforcement agencies continue to investigate the overseas links and identify the masterminds behind the alleged syndicate.
As the probe progresses, authorities are urging citizens—particularly senior citizens—to remain vigilant against calls invoking law enforcement agencies, courts, or regulatory bodies demanding urgent financial transfers.
#CyberCrime #DigitalArrestScam #DelhiPolice #FinancialFraud #OnlineSafety #CyberAwareness #IndiaNews #ScamAlert

