Mathura: Cyber fraud investigations in Uttar Pradesh’s Mathura district have taken a serious new turn, with police uncovering the systematic use of proxy VPN technology by fraudsters to conceal their identity and real-time location. Officers probing cybercrime hotspots found that almost every mobile phone seized from 37 accused arrested across four villages had proxy VPN applications installed — a discovery that has surprised even experienced investigators.
Senior police officials said the technology enabled the accused to remain undetected for long periods, making digital tracking and jurisdictional mapping extremely difficult. The findings underline how cybercrime networks operating from rural pockets are rapidly becoming technically sophisticated and highly organised.
How Proxy VPNs Made Digital Identity “Disappear”
Technical experts assisting the probe explained that proxy servers and VPNs reroute internet traffic through third-party servers, masking the user’s original IP address and physical location. While a VPN encrypts and secures an entire internet connection, a proxy typically operates at the application or browser level, hiding IP details for specific activities.
Investigators believe the accused used a combination of VPNs and proxies so that scam calls, phishing links, fake investment pages and impersonation attempts appeared to originate from different Indian states — and in some cases, from abroad. This tactic helped divert suspicion and allowed illegal proceeds to be routed across multiple jurisdictions.
All Digital Evidence Sent for Forensic Examination
Senior Superintendent of Police Shlok Kumar said all seized mobile phones have been sent to a forensic laboratory for in-depth analysis.
“Experts will retrieve deleted chats, call logs, VPN usage data, app activity and transaction trails. This forensic evidence will be the backbone of the prosecution and establish organised cyber fraud beyond doubt,” he said.
Officials added that VPN logs, SIM-mapping data and payment trails will help identify handlers, financiers and technical enablers behind the network.
‘Red Zone’ Villages at the Core of the Scam Network
Police said the villages from which the arrests were made had already been classified as cybercrime red zones due to repeated complaints. These areas allegedly functioned as operational hubs for:
- Fake investment schemes
- ‘Digital arrest’ scams
- KYC update frauds
- Malicious APK and phishing link scams
Local youths were reportedly trained using scripted conversations, while the technical backbone relied on proxy VPNs, illegally obtained SIM cards and burner phones. This structure allowed scams to be executed at scale with minimal immediate detection.
First Invocation of Organised Crime Provisions in Mathura
Given the scale, coordination and technological sophistication, Mathura Police have invoked Section 111/3 of the Bharatiya Nyaya Sanhita (BNS) — provisions dealing with organised crime.
SP (Rural) Suresh Chandra Rawat said this is the first time cyber fraud accused in the district have been booked under organised crime sections since the BNS came into force.
Conviction under these provisions can lead to:
- Imprisonment from five years to life
- Confiscation of assets acquired through illegal activities
Probe Likely to Expand Beyond Mathura
Investigators believe the 37 arrested individuals are only foot soldiers in a much larger network. Once forensic analysis is completed, police expect new leads involving:
- Additional bank and mule accounts
- Cryptocurrency wallets
- Interstate and possible international handlers
Senior officers said the case demonstrates how emerging technology is being weaponised to run structured cybercrime rackets — and warned that more arrests and tougher action are imminent.
