Four Arrested for Impersonating Customs Officials Using Pakistani IP Address for Fraudulent Activities
Law Enforcement Cracks Down on Cross-Border Cyber Fraud Ring
A recent operation by the Cyber Crime Branch in Kanpur has led to the arrest of four individuals, including a woman, for their involvement in a sophisticated cyber fraud scheme. The gang, which operated by impersonating customs and police officials, used a messaging app and a Pakistani IP address to deceive victims.
Investigation and Arrests
According to officials, the investigation began after multiple complaints were filed on the Indian Cyber Crime Coordination Centre’s Reflection Portal regarding the misuse of a Kanpur-based mobile number. The probe revealed that the gang used a closed mobile number to carry out their operations, which was operated on a telecom service provider’s computer system in Kanpur. This setup allowed the gang to send messages without triggering alert notifications.
The arrested individuals have been identified as Kamlesh Kumar Gautam, Vikas Gautam, Rakhi Mishra, and Deepak Sharma. Authorities claim that the gang operated from an IP address traced to Islamabad, Pakistan, and used the messaging application to send fraudulent messages along with a police profile picture to gain the trust of their victims.
Modus Operandi and Victims
Investigations suggest that Kamlesh and Rakhi had previously worked in marketing jobs in Lakhimpur Kheri. Kamlesh had a history of involvement in barcode-based fraud at petrol pumps and had served jail time, where he allegedly met Deepak Sharma and developed their criminal network. Police believe Kamlesh was the mastermind behind the gang.
The gang’s modus operandi involved contacting victims by posing as customs or police officers and intimidating them to extract money. Vikas was responsible for arranging online money transfers, while Rakhi’s role was to lure victims by offering government scheme benefits, flats, and using threats. At least 36 people have fallen victim to the gang’s tactics, with reported cases in cities including Agra, Haridwar, Shravasti, Patna, Sasaram, and Jaipur.
Further Investigation and Warning
The police are currently searching for other members involved in the network and plan to interrogate staff members of the telecom company’s Kanpur office to determine how the number was activated on the server without their knowledge. Investigators are also examining whether any internal staff had links with the gang.
