Nuh Police have arrested three men in connection with alleged cyber sextortion and online fraud schemes, recovering fake SIM cards, mobile phones and digital material that investigators say points to a wider pattern of organised cyber activity.
Suspects Traced Through Suspicious Mobile Number
The arrests followed a police operation that began after investigators detected a suspicious mobile number on an online portal. Acting on that lead, police tracked down one suspect, identified as Salman, in the Ferozepur Namak area.
Further searches then led to the arrest of two more suspects, Zahid and Usaid, from Hussainpur village. The action, officials said, forms part of an ongoing investigation into cyber sextortion and online fraud activities in the district.
FCRF Academy Launches Premier Anti-Money Laundering Certification Program
Fake SIM Cards and Digital Evidence Seized
Police said the operation led to the seizure of fake SIM cards, cell phones and other digital evidence allegedly linked to the suspects’ activities. The investigators recovered WhatsApp chats, debit messages and barcode related data that they believe are tied to fraudulent conduct.
Such material is often treated as crucial in cybercrime inquiries because it can help police establish communication patterns, payment trails and the methods used to contact or pressure victims. In cases involving sextortion and online fraud, fake SIM cards and multiple digital accounts are frequently used to conceal identities and make tracing more difficult.
Probe Continues Into Wider Online Fraud Links
A Nuh Police spokesperson said the investigation is ongoing and noted the alleged use of fake SIM cards and social media accounts in the operation. The reports do not specify the exact number of victims or the financial scale of the fraud, but they indicate that police are examining the digital trail for broader connections.
The case underlines the way cyber sextortion and related frauds increasingly rely on disposable communication tools, rapid identity switching and messaging platforms to target victims. Police action in such cases often begins with a small technical lead, such as a suspicious number or device trail, before expanding into a broader inquiry into how the network functioned and who else may have been involved.