Police inspect seized laptops and dialer systems allegedly used to operate the fake call-centre units targeting victims nationwide.

Pilibhit: International Fake Call-Centre Network Discovered

The420 Correspondent
5 Min Read

Pilibhit (Ghungchai): The Ghungchai police have dismantled a large, organised cyber-fraud syndicate operating through fake call centres and duping people across India via gaming apps. The crackdown came after a coordinated raid in Rudrapur (Uttarakhand), where a team arrested six accused from Nepal, Gujarat, and Madhya Pradesh. The investigation has uncovered an international trail, including the involvement of local youth who had allegedly received operational training in Dubai.

Police recovered laptops, mobile phones, foreign SIM cards, forged documents and other digital devices used to operate the racket. Investigators estimate that the syndicate manipulated users into making investments worth over ₹5.54 crore, primarily by exploiting online games such as “Aviator” and “Rummy”, promising unusually high returns and eventually draining victims’ bank accounts.

Dubai connection: accused learnt call-centre fraud techniques abroad

Two days prior to the major arrests, police had detained Amritpal Singh and two associates. During interrogation, it emerged that Amritpal had worked in Dubai, where he allegedly acquired knowledge of call-centre operations and digital fraud mechanisms.

FCRF Launches Flagship Compliance Certification (GRCP) as India Faces a New Era of Digital Regulation

Upon returning to India, Amritpal recruited acquaintances and set up multiple fake call-centre units across Rudrapur, Madhotanda and other locations. The group targeted gaming app users, luring them with claims of doubling or tripling their money. By showing fabricated initial winnings, the fraudsters gained the victims’ confidence and secured access to their banking details.

Rudrapur crackdown: six arrested in late-evening raid

Based on disclosures made by Amritpal, a police team raided a premises at Gaba Chowk, Rudrapur. Six members of the network were apprehended:

  • Manjeet Singh alias Sonu — gang leader, resident of Basantpur Nauner (Pilibhit)
  • Chakra Khadka — Nepal national
  • Vikrant Pandit alias Vicky — originally from Gujarat
  • Kapil Mehra — resident of Bhopal
  • Kunal Prajapati — Bhopal
  • Prashant Singh — Bhopal

From the site, officers recovered 13 laptops, 13 mobile phones, foreign SIM cards (including UAE), printers, and other technical equipment used in the fraud.

Fraud executed through frozen software and automated dialer systems

According to police officials, the gang used “frozen software” and online dialer systems linked to the domain fairplay247.games. Vikrant Pandit, who previously worked in a Dubai call centre, acted as the group’s technical trainer, teaching others how to run the fraud infrastructure.

The syndicate bought user data—primarily gaming-related—from the dark web and subsequently reached out to potential victims through coordinated calling and chatting operations.

  • Kapil and Kunal handled outbound calling
  • Prashant executed real-time chats to trap users
  • Priyanshu and Dharmendra supplied fake SIM cards and bank accounts

Investigators noted that some of the accused were driven by expensive personal habits, including substance addiction and demands from romantic partners.

Over 50,000 user logins found; transactions traced to ₹5.54 crore

A critical breakthrough occurred when police examined the laptop used by Nepalese national Chakra Khadka. Logs from the “Airplay” app revealed over 50,000 user accounts, of which nearly 20,000 had made deposits.

Additionally, devices seized from Vikrant and Khadka contained data for 11,739 user IDs, through which ₹5,54,40,242 worth of fraudulent “investment transactions” were conducted.

Circle Officer Prateek Dahiya confirmed that multiple fictitious SIMs and bank accounts were supplied by Priyanshu Dixit, Dharmendra Kumar, and Rakesh from Gorakhpur. The police are now mapping the financial trail to identify the full scope of the network.

Inter-state footprint: fraud cases registered across multiple states

Bank accounts linked to the syndicate are already tied to cyber-fraud complaints filed in Odisha, Tamil Nadu, Bihar, Karnataka, Gujarat, Maharashtra, Madhya Pradesh, Rajasthan, Haryana and Uttar Pradesh.

Following Amritpal’s arrest, the gang briefly relocated to Madhotanda and was preparing to flee to Delhi. However, the Rudrapur raid pre-empted their escape.

Police advisory: steps to avoid cyber-fraud

Do not share banking credentials with unknown individuals.

  • Avoid clicking on links offering lotteries, prizes or expensive travel deals.
  • Refrain from downloading APK files sent by strangers.
  • Do not fall for claims of guaranteed high returns on gaming or investment apps.
  • Report cyber-fraud immediately to 1930.
  • Contact your nearest police station or cyber cell for assistance.

Stay Connected