Jan Dhan Account Mule Network Exposed: ₹22-Crore Cyber Fraud Scheme Uncovered

Jan-Dhan-Account-Mule-Network-Exposed-22-Crore-Cyber-Fraud-Scheme-Uncovereddata

Recent ₹22-crore cyber fraud case exposes vulnerability in India’s financial inclusion framework

A recent ₹22-crore cyber fraud case has exposed a significant vulnerability in India’s financial inclusion framework, highlighting the exploitation of Pradhan Mantri Jan Dhan Yojana accounts as a structured mule network to layer and disperse stolen funds.

Modus Operandi

According to investigators, the fraudsters deliberately targeted Jan Dhan accounts, which often exhibit minimal transaction history and are frequently dormant. The account holders, typically from economically vulnerable groups, were either lured with small commissions to open accounts or hand over control of their ATM cards and passbooks.

The probe revealed a three-tier hierarchy within the mule network. At the base were mule account holders, whose identities were used to route funds. Above them were mule handlers, responsible for distributing incoming amounts across multiple accounts, coordinating ATM withdrawals, and initiating onward transfers. At the top were core operators, who managed digital communications, scripted fraudulent calls, masked IP activity, and timed fund movements.

Technical Pattern of Layering

The technical pattern of layering involved a consistent fund-flow model. Money transferred from the victim’s account was immediately divided among three to five mule accounts. A portion was withdrawn in cash within hours, while the remaining funds were moved via RTGS and IMPS to accounts in other states. In the final stage, the money was broken into smaller amounts and settled into beneficiary accounts, extending the transaction chain and obscuring the origin.

Investigation and Concerns

A visiting card recovered from one accused, belonging to another suspect, established direct operational links within the network, indicating a planned and coordinated structure rather than isolated activity. Digital devices, call data records, and banking logs are being forensically analyzed to build a comprehensive fund-flow map and identify the masterminds.

The case has raised concerns about banking oversight, as several accounts showed sudden spikes in activity, cross-state access patterns, and unusual ATM withdrawals, yet effective risk flags were either delayed or absent. Investigators are examining whether risk-based monitoring systems and periodic reviews of dormant accounts were adequately implemented.

Expert Analysis

Cybercrime experts note that the use of Jan Dhan or inactive accounts as money mule networks has become an established laundering method. By simulating legitimate retail transactions, fraud proceeds are disguised, and investigative tracing becomes more complex. Such networks often operate across states, with accounts opened in one region, cash withdrawals in another, and final beneficiaries located elsewhere.

Arrests and Recovery

While some residual balances have been frozen, rapid cash withdrawals and multi-layer transfers have significantly reduced the chances of full recovery. Eight arrests have been made so far, and interstate raids are underway to locate core operators. Authorities are working with financial intelligence units and banks to trace ultimate beneficiaries and dismantle the broader network.

Conclusion

The case highlights the need for real-time transaction monitoring, active review of dormant inclusion accounts, and public awareness about mule account risks. Without these safeguards, financial inclusion instruments risk being repurposed as efficient layering tools for organized cybercrime.




About Author

en_USEnglish