Army Personnel Trapped in Telegram Honeytrap, Held Hostage and Forced to Transfer Lakhs

The420 Correspondent
4 Min Read

Lucknow | Correspondent- In a shocking case of digital entrapment, an Indian Army personnel was allegedly lured into a honeytrap through the Telegram app and later held hostage by a gang in Agra. The gang reportedly assaulted him, recorded an obscene video at gunpoint, and extorted ₹8.69 lakh under threat of making the footage public.

Taking the matter seriously, the police have involved the Cyber Crime Cell, bank fraud monitoring units, and social media surveillance teams to trace the accused. The incident took place in Agra, where the victim is posted at the 509th Armed Base Workshop.

Friendship on Telegram Turns Into a Trap

According to investigators, the soldier befriended a woman on Telegram a few weeks ago. Their conversations gradually turned personal, after which the woman invited him to meet in Agra. Trusting her, he travelled to the city — unaware of the trap awaiting him.

FCRF Launches Flagship Compliance Certification (GRCP) as India Faces a New Era of Digital Regulation

As soon as he arrived at the location, the woman, along with her accomplices, took him to a room where he was beaten and held captive. Under intimidation, the gang recorded an explicit video of him and demanded money. The victim was forced to transfer ₹8.69 lakh online to secure his release.

Gang Demanded ₹40 Lakh More; Threatened to Leak Video

The ordeal did not end there. A few days after the initial payment, the accused contacted the soldier again, demanding an additional ₹40 lakh. They threatened to release his obscene video on social media if he failed to pay the amount. Terrified and under mental pressure, the soldier finally approached the police and filed a formal complaint.

Video Recorded Under Gunpoint

During interrogation, police learned that the video was deliberately staged and directed by the gang. The victim revealed that the woman and two men filmed the clip using a mobile phone while holding a pistol to his head.

Investigators believe the gang is part of a wider network targeting defence personnel, bank employees, and government workers through fake online identities. The cyber cell is now using digital forensics, bank transaction tracking, and IP tracing to identify the suspects.

False Confession Forced on Victim

Before leaving, the accused allegedly coerced the soldier to write a false confession on plain paper, stating that he had met a 17-year-old girl multiple times in a hotel and was willing to marry her. Police said the fabricated statement was meant to blackmail him later if he reported the incident.

A case has been registered under relevant sections of extortion, criminal intimidation, and cyber fraud. The police are also examining the financial trail of the transferred amount to trace the beneficiaries.

Personal Belongings Looted

The victim further stated that the accused also took away his mobile phone, wallet, and identification documents before fleeing. Police have traced the phone’s last location and are conducting raids at possible hideouts in Agra and nearby districts.

Cyber Cell Expands Investigation Across States

Inspector, who is leading the probe, confirmed that a detailed investigation is underway. “A formal FIR has been registered based on the soldier’s complaint. Teams are actively pursuing digital and physical leads to arrest the culprits,” he said.

Preliminary findings suggest the gang operates across multiple states, systematically targeting individuals in the armed forces and government institutions through fake profiles and online chat platforms like Telegram, WhatsApp, and Instagram.

Stay Connected