Fake ‘Microsoft Support’ Racket Busted In Bengaluru

The420.in Staff
5 Min Read

The Bengaluru Police have uncovered a major cyber-fraud operation targeting US citizens by impersonating Microsoft Technical Support. A joint team of the Cyber Command’s Special Cell and the Cyber Crime Police of the Whitefield Division conducted coordinated raids, bringing the elaborate setup to light.

The operation focused on MUSK Communications, a company that began functioning in August 2025 and was operating from a 4,500 sq ft premises in the Whitefield area. According to investigators, the establishment resembled a full-scale call centre, complete with system networks, trained agents and structured calling protocols.

“Centre for Police Technology” Launched as Common Platform for Police, OEMs, and Vendors to Drive Smart Policing

Posing As Microsoft Technicians, Agents Scammed US Citizens

During the raid, officers found that the employees were systematically trained to pretend to be Microsoft support technicians. Their calls were largely directed at US residents, aligned with American time zones to ensure maximum response and to maintain the illusion of legitimacy.

The employees allegedly alerted victims to fabricated cyber threats—fake malware alerts, security breaches or system compromise messages—and then persuaded them to grant remote access. Once access was secured, the callers demanded hefty service fees, extracted banking details or manipulated victims into making payments through online channels.

According to police officials, the operation followed an international tech-support scam model that has surfaced repeatedly in recent years across major Indian cities.

21 Held; Computers, Mobile Phones And Digital Scripts Seized

The police executed court-authorized search warrants on Friday and Saturday. During the raid, 21 employees were apprehended while they were actively engaged in their fraudulent roles. Many were found working on scripted pitches, victim databases and VoIP-enabled systems designed to mask caller identity and location.

Investigators confiscated an extensive array of electronic material, including desktops, laptops, mobile phones, routers, call-routing devices, digital scripts, foreign customer lists and documents indicating financial transactions. Officers said the seized material suggested a highly structured operational hierarchy, involving separate teams for calling, data handling and payment collection.

Preliminary assessment indicates that the scam was already generating significant revenue, despite being operational for only a few months.

Case Registered Under IT Act and BNS Provisions

A case has been registered under Sections 66 and 66(C) of the IT Act, 2000, dealing with identity theft, cheating through computer resources and misuse of digital information. Additionally, provisions under Section 318(4) of the Bharatiya Nyaya Sanhita (BNS) have been invoked, covering fraud committed through impersonation and electronic means.

Officials stated that the arrested individuals will be questioned further to identify the masterminds behind the setup. The owners, recruiters and technical coordinators who established the infrastructure are currently under the police radar.

Forensic Examination Of Devices Underway

The digital equipment seized during the raid has been sent for forensic analysis. The police expect to recover call logs, financial trails, chat records, target databases and remote-access sessions that will help trace the larger network involved.

A senior official said that such operations are becoming increasingly sophisticated, with scammers relying on cloud servers, foreign VoIP lines and anonymized tools to evade detection. “These rackets operate like corporate entities, with recruitment, training modules and incentive-based targets,” the officer noted.

Authorities believe the MUSK Communications operation may have links to similar fraudulent setups in other cities. The forensic trail may reveal whether the group collaborated with international handlers or third-party data suppliers.

Possibility Of International Coordination

Given that the victims were primarily US citizens, Bengaluru Police may collaborate with international agencies, including American cyber-security bodies and federal authorities. Cross-border data-sharing may be initiated if evidence points to large-scale financial loss abroad.

Investigators suspect that the arrested individuals were only the frontline operators. The financial beneficiaries, backend technicians and data procurement teams likely remain at large. Multiple teams have been deployed to track the remaining suspects and identify funding channels.

Stay Connected