Police busted a Jamtara-linked cyber fraud racket after a six-month probe into fake RTO link scams. Four accused, including the mastermind, were arrested for using APK malware and mule accounts to siphon money across states.

Six-Month Cyber Hunt Ends in Jamtara Gang Crackdown, Key Operatives Arrested in Multi-State Fraud Case

The420.in Staff
3 Min Read

In a major breakthrough against organised cybercrime, police have dismantled an inter-state fraud racket linked to the notorious Jamtara network after a six-month-long investigation. Multiple accused, including the alleged mastermind, were arrested for orchestrating phishing attacks and siphoning off money through mule accounts.

The case began after a victim, Jashwant Jena, filed a complaint alleging fraud through a fake RTO challan link. According to investigators, the victim received a suspicious link which, once clicked, compromised his mobile device.

Within days, ₹7 lakh was fraudulently withdrawn from his bank account, exposing the scale of the operation. The incident prompted cyber police to register a case and initiate a detailed probe into what appeared to be a larger organised network.

Six-Month Surveillance Operation

Police launched a coordinated, multi-team investigation, placing suspects under continuous surveillance over several months. The prolonged operation involved tracking digital footprints, financial trails, and communication patterns across states.

The crackdown culminated in the arrest of the kingpin, identified as Mukesh Turi of the Jamtara network, along with three associates from Telangana. Authorities confirmed that the accused were part of a structured cybercrime ecosystem operating across regions.

FCRF Academy Launches Premier Anti-Money Laundering Certification Program

Mule Accounts and APK Malware Used

Investigators revealed that the gang relied heavily on mule bank accounts to route stolen funds and avoid detection. Associates were tasked with opening accounts in the names of relatives or unsuspecting individuals, which were then used to channel illicit money.

The fraud was executed using malicious APK files and phishing links. Once victims downloaded these files, attackers gained control over their mobile devices, enabling access to sensitive banking data, OTPs, and personal information.

Organised Network With Defined Roles

Police findings indicate a well-organised structure within the gang. Different members handled specific roles—creating fake links, procuring mule accounts, managing transactions, and coordinating with the mastermind.

The accused reportedly targeted victims across multiple states, using social engineering tactics and impersonation strategies to gain trust and execute fraud.

Probe Continues, Public Advisory Issued

Authorities have stated that further investigation is underway to identify additional members and uncover the full extent of the network. More arrests are likely as the probe expands.

Police have also issued a public advisory, warning citizens against clicking on unknown links or downloading APK files from unverified sources—common entry points for such cyber fraud attacks.

About the author – Ayesha Aayat is a law student and contributor covering cybercrime, online frauds, and digital safety concerns. Her writing aims to raise awareness about evolving cyber threats and legal responses.

Stay Connected