Delhi Police recovered 1,826 mobile phones and a full IMEI-tampering setup during Operation CyberHawk, which exposed an illegal mobile assembly unit in Karol Bagh.

Chinese Parts, Stolen Motherboards: Illegal Phone Unit Discovered in Karol Bagh

The420 Correspondent
4 Min Read

New Delhi — Delhi Police have dismantled a sophisticated illegal mobile phone assembly unit in the crowded lanes of Karol Bagh, exposing an underground factory that had been refurbishing stolen devices and altering their IMEI numbers — a practice that police say helps fuel cybercrime, theft and financial fraud across the country.

The bust, carried out under Operation CYBERHAWK, resulted in the arrest of five individuals and the seizure of 1,826 mobile phones, a complete IMEI-tampering software system, scanners, tools and thousands of imported Chinese phone body kits.

Officials said the unit had been active for nearly two years, operating as a covert assembly line for “new” phones built from stolen components and unregistered parts sourced from across India and China.

FCRF Launches Flagship Compliance Certification (GRCP) as India Faces a New Era of Digital Regulation

A High-Tech Criminal Network Hidden in Plain Sight

Investigators said the operation blended traditional hardware smuggling with advanced software manipulation.

1. Stolen motherboards bought from scrap markets

The accused allegedly purchased damaged or stolen phones — especially their motherboards — from scrap markets across Delhi and the National Capital Region at extremely low prices.

2. New “Chinese bodies” shipped monthly

Large consignments of phone frames, panels and shells were imported from China. Once paired with old motherboards, these parts allowed criminals to build phones that looked factory-fresh.

3. IMEI rewriting via specialized software

The core of the operation relied on software programs such as WRITEIMEI 0.2.2 and WRITEIMEI 2.0, used to erase a device’s original IMEI and replace it with a fabricated one.
An IMEI scanner and reader machine were then used to verify the new identity.

“This is what makes such phones almost untraceable,” a senior officer said. “It’s a direct threat to law enforcement’s ability to track stolen or crime-linked devices.”

4. Phones assembled and boxed for sale

During the raid, police found workers fitting old motherboards into new Chinese frames, altering IMEI codes on laptops, and packaging the phones for market distribution.

5. A distribution network across Delhi–NCR

The refurbished handsets were allegedly sold through channels in Karol Bagh, Gaffar Market and several other mobile hubs in the region.
Police believe hundreds of these phones enter the black market every month.

What Police Found During the Raid

Operation CYBERHAWK resulted in a large-scale seizure, including:

  • 1,826 mobile phones (finished and semi-finished)
  • Laptops containing IMEI-writing software
  • IMEI scanner/reader machines
  • Thousands of Chinese-made phone bodies and frames
  • Tools and equipment for mobile assembly
  • A stock of fake IMEI labels
  • Authorities said the setup resembled a “miniature factory,” capable of producing a steady stream of counterfeit devices.

How Police Discovered the Hidden Factory

Karol Bagh police had been tracking suspicious mobile-related activity for nearly two weeks.
Specific leads emerged from a fourth-floor unit in Beadonpura, Gali No. 22.

On November 20, 2025, officers raided premises operating under the name “Aditya Electronics & Accessories.” Inside, they found workers actively replacing motherboards, altering IMEIs, and packaging finished phones for sale.

Five men — including unit owner Ashok Kumar (45) and associates aged 19 to 36 — were arrested at the site.

What Investigators Are Probing Next

Police are now mapping the wider supply chain behind the operation:

  • How and where stolen motherboards were procured
  • The China-based suppliers are sending large batches of phone bodies
  • The downstream network distributing the counterfeit devices
  • Possible links to organized cybercrime and fraud rings
  • Officials say more arrests are likely as the investigation expands.

“This was not a small operation,” a senior official said. “It was a coordinated, high-volume setup feeding cybercriminals with untraceable devices.”

Stay Connected