Authorities in Varanasi have broken up a cyber fraud ring that supplied fake SIM cards to criminal groups across India. Four suspects—Sunil Yadav, Shubham Agrahari alias Gopal, Neyaz Ahmed, and Arun Tripathi—were arrested in coordinated raids by teams from Lalpur-Pandeypur and the Cyber Crime Cell. Investigation revealed that the gang defrauded unsuspecting individuals through counterfeit SIMs enabled by double KYC misuse.
Data Protection and DPDP Act Readiness: Hundreds of Senior Leaders Sign Up for CDPO Program
Operation and Seizure Details
Police confiscated a total of 71 SIM cards—11 active and 60 inactive—along with a biometric device, four Android phones valued at around INR 1 lakh, and approximately INR 18,490 in cash. Investigators traced the syndicate’s operations to areas including Azamgarh’s Pandeypur, Nai Basti, and Hartirath.
The gang targeted less-educated people seeking legitimate SIM services and convinced them to undergo both electronic and document-based Know Your Customer checks. Using this data, the criminals generated unauthorised SIM cards, which were then sent via courier or bus to cyber fraud operators in Delhi and other states, to facilitate scam operations.
Legal Action and Telecom Oversight
Police have charged the accused under relevant sections of the Indian Penal Code and the IT Act, including organised crime provisions. Additionally, the telecom provider has been ordered to revoke its POS agent’s license immediately.
“This ring was using legitimate-looking SIM services to mask illegitimate activities,” said ADCP (Kashi zone/crime) T. Saravanan. “Despite attempts to build trust with victims, the gang was aiding fraud on a larger scale by providing SIM infrastructure to cybercriminals.”
Why It Matters
The case reflects how SIM card fraud—especially involving data misuse and double KYC encryption—can enable far-reaching cybercrime. Experts warn that such networks erode trust in digital services and underscore the need for more robust telecom security because fake SIMs are often a key first step in phishing, fraud, and money laundering schemes.
