Muzaffarnagar | January 9, 2026: A man who allegedly posed as a senior official of the Enforcement Directorate (ED) to dupe people of ₹50 lakh has been arrested by the Patiala cyber police team from Goyla village in Muzaffarnagar district of Uttar Pradesh. The accused, identified as Amit Balyan, was apprehended during a targeted raid in the Shahpur police station area, while three of his associates managed to flee from the spot, officials said.
According to the police, the arrest was made when Balyan was travelling in a car belonging to an office-bearer of a farmers’ organisation. Acting on specific intelligence inputs, the Patiala cyber team coordinated with local police and laid a trap in Goyla village, where the accused had been hiding for several days to evade arrest.
Impersonation of ED Officer and Extortion Tactics
Investigators said Balyan had been operating a well-organised cyber fraud racket, impersonating a senior ED officer to intimidate victims and extort large sums of money. Using spoofed phone numbers and fake digital identities, he would contact targets in Punjab, including Patiala and surrounding districts, accusing them of involvement in money laundering and illegal foreign transactions.
Police said the accused employed psychological pressure tactics to trap victims. After initial phone calls, he would shift to video calls where a fake courtroom setup and impersonated officials were displayed. Victims were told they were under “digital arrest” and warned of imminent legal action unless they cooperated. The elaborate deception often left victims panicked and vulnerable.
₹50 Lakh Transfer Triggers Investigation
In one such case, a Patiala-based trader was allegedly coerced into transferring ₹50 lakh to multiple bank accounts to avoid arrest and prosecution. The trader later realised he had been cheated and approached the Patiala cyber police with a formal complaint, triggering the investigation that led to Balyan’s arrest.
During the probe, police discovered that the accused used social media platforms and online databases to gather personal and professional details of potential victims. These details were then used to make the threats appear authentic. Officers believe the racket was operating across multiple states and had a structured hierarchy involving technical handlers and money mules.
Cash, Devices Seized; Associates on the Run
A search conducted after the arrest led to the recovery of ₹20 lakh in cash, a laptop, several mobile phones, multiple SIM cards, and forged documents allegedly used in the fraud. The seized digital devices have been sent for forensic examination to trace financial transactions, identify accomplices, and uncover the full scale of the operation.
During interrogation, the accused reportedly confessed to his involvement in similar cyber fraud cases in Chandigarh and Ludhiana. Police suspect that the total amount siphoned off by the gang could be significantly higher, with more victims yet to come forward.
Technical Team Behind Fake Courtrooms and Video Calls
Officials said Balyan acted as the main operator of the gang, coordinating with technical experts who created fake government identities, manipulated video call backgrounds, and managed the digital infrastructure used in the fraud. Central agencies and cyber experts are being consulted to strengthen the investigation and trace interstate and digital links.
Manhunt Launched for Three Absconding Associates
Police have launched a manhunt to track down the three absconding associates and are examining bank accounts used for routing the defrauded money. Further arrests are expected in the coming days as the probe progresses.
Authorities have issued a public advisory urging citizens to remain alert against calls or video communications from individuals claiming to be officials of agencies such as the ED, CBI, or income tax department. Officials reiterated that no law enforcement agency demands money over phone or video calls and advised people to report such incidents immediately to the nearest police station or cyber crime unit.
