Surat: A 39-year-old former national-level weightlifter has been arrested in connection with a ₹70,000 cyber fraud that targeted a city-based resident through a fake traffic challan link. The accused, Bodu Paleja, is currently employed on contract at a taluka health centre in Junagadh and had represented India in a weightlifting championship during his teenage years.
How the APK File Enabled Access
Investigators said the case came to light after a Surat resident reported that ₹70,000 was siphoned off from his bank account shortly after he downloaded an APK file sent via a message claiming to be related to an unpaid RTO challan. The fraudulent link, designed to resemble an official notice, allegedly installed malicious software on the victim’s phone, enabling unauthorised access to banking details.
FCRF Launches Flagship Certified Fraud Investigator (CFI) Program
Digital Trails and Credit Card Payments
Preliminary findings suggest that the defrauded amount was transferred and subsequently used to clear outstanding dues on two credit cards held by Paleja—one issued by Bank of Baroda and another by ICICI Bank. Digital transaction trails and account analysis reportedly linked the disputed transfers to the accused.
Paleja, who currently works as a TB supervisor at a government health facility in Junagadh, had also been associated part-time with a private finance company in the past. Authorities are examining whether the accused acted independently or was part of a broader network involved in phishing and digital payment fraud.
Wider Concerns Over Mobile-Based Financial Fraud
According to officials familiar with the probe, the complainant received a text message that appeared to originate from a legitimate transport authority source. The message warned of penalties for an alleged traffic violation and urged immediate payment to avoid legal consequences. Upon clicking the embedded link, the victim was prompted to download an application file. Within hours, suspicious transactions were recorded from his account.
The arrest was made after digital footprints, including IP address mapping and financial tracking, pointed towards Paleja’s involvement. During questioning, investigators reportedly confronted him with transaction records reflecting payments made towards his credit card accounts shortly after the complainant’s funds were withdrawn.
While the amount involved in the present case stands at ₹70,000, officials believe the method employed mirrors patterns seen in larger phishing rackets operating across states. Devices seized during the investigation are being subjected to forensic analysis to determine whether additional victims may have been targeted.
The accused has been remanded to custody for further interrogation. Investigators are examining bank records, digital devices and communication logs to ascertain the full extent of the operation.
