Bhubaneswar. In a major breakthrough against organized cybercrime, the Commissionerate Police have busted a Jamtara-based cyber fraud network allegedly involved in large-scale online financial scams across multiple states. Four accused, including the suspected mastermind, have been arrested from Hyderabad and Jamtara in connection with a ₹7 lakh cyber fraud case registered in Bhubaneswar.
Fake ‘RTO Challan’ APK Turns Into Gateway
Police officials said the arrests were made after a detailed investigation into a complaint filed by a victim, Jashobanta Jena, who reported unauthorized transactions from his HDFC Bank account on September 14, 2025. The complainant alleged that nearly ₹7 lakh was siphoned off after he unknowingly opened a malicious APK file named “RTO Challan” received through a WhatsApp group.
Following the complaint, a case was registered on September 15, 2025, and a technical investigation was launched to trace the money trail and identify the perpetrators. Cyber forensic analysis, digital tracking, and banking intelligence inputs eventually led investigators to multiple suspects operating across Telangana and Jharkhand.
FCRF Academy Launches Premier Anti-Money Laundering Certification Program
Jamtara Mastermind Allegedly Linked to Phishing
The arrested individuals have been identified as Mohammed Abbas (37), Md Salman (29), Md Amair (31) from Hyderabad, and Mukesh Turi (27) from Jamtara in Jharkhand. Police have identified Mukesh Turi as the alleged mastermind of the racket, who was operating as a key coordinator between different layers of the cyber fraud network.
According to investigators, Mukesh is part of a larger five-member cyber gang based in Jamtara, a region frequently linked to phishing and digital fraud cases across India. The network allegedly includes individuals identified as King Khan, Rehan Khan, Subham alias Dot, and Raj Kumar, who collectively create and circulate malicious APK files and phishing links designed to steal banking credentials and OTPs from unsuspecting victims.
Accused Opened Bank Accounts To Route Stolen Cyber Fraud Money
Police officials stated that Mukesh frequently travelled between states by air and acted as a crucial link between mule account holders, local agents, and core operatives managing the financial flow of the stolen money. He is also suspected of coordinating with handlers in Telangana, effectively functioning as a regional operator for the wider syndicate.
Investigators revealed that Mohammed Abbas and Md Salman were responsible for opening mule bank accounts using identities of family members and vulnerable individuals. These accounts were then used to receive fraudulently transferred funds. Abbas reportedly received around ₹3 lakh from the stolen amount in this case.
Md Amair is alleged to have played the role of collecting multiple mule accounts from Abbas and Salman and forwarding them to Mukesh Turi for further routing of funds. Once the money reached these accounts, it was withdrawn, transferred, or layered to conceal its origin.
Police further disclosed that the gang operated in a structured manner where victims were first targeted through fake messages or links embedded with APK files. Once installed, these applications allegedly gained access to sensitive data such as banking credentials and OTPs, enabling unauthorized transactions without the victim’s immediate knowledge.
Digital Devices And Transaction Trails Reveal Bigger Scam
Officials described the network as a highly organized digital fraud ecosystem, where different members were assigned specific roles such as link generation, account creation, fund transfer, and cash withdrawal. The coordination between Jamtara-based cyber operators and outstation handlers initially made the racket difficult to detect.
The Commissionerate Police stated that all accused were brought on transit remand after coordinated raids in Telangana and Jharkhand on April 19, 2026. Digital devices, transaction records, and communication data have been seized and are currently being analyzed for further leads.
Investigators are also working to identify additional victims and trace whether the gang is linked to similar cyber fraud cases reported in other states. The role of financial intermediaries and possible larger networks is also under scrutiny.
Cybercrime experts note that Jamtara-based gangs have evolved significantly, shifting from simple phishing calls to sophisticated malware-based attacks using APK files, fake government notifications, and social media traps.
Authorities have urged citizens to avoid downloading unknown files or clicking on suspicious links, especially those received through messaging platforms. They also emphasized the importance of enabling multi-layer banking security features to prevent unauthorized access.
The investigation remains ongoing, with officials expecting more arrests and deeper revelations in the coming days as digital evidence continues to be examined.