An 82-year-old resident of Pune was not confronted by an armed robber or a forged document, but by a screen, a voice and the authority those things can falsely project. According to Pune cyber police, fraudsters posing as officials from the Telecom Regulatory Authority of India and the Central Bureau of Investigation told the man that a Canara Bank account linked to his Aadhaar had surfaced in a money-laundering case. The accusation was accompanied, investigators said, by threats of arrest and the staging of a fake virtual courtroom over video calls.
Over several days between January 23 and January 31, 2026, the victim was allegedly pressured into transferring his savings into multiple bank accounts controlled by the fraud network. By the time the deception had run its course, police said, he had lost ₹10.74 crore.
This is the logic of what Indian cybercrime investigators increasingly describe as “digital arrest” fraud: not a legal process, but a theater of intimidation. The method relies on impersonation, on official-sounding language, on the invocation of institutions people are conditioned to fear, and increasingly on visual props — video calls, fabricated proceedings and staged displays of authority — to collapse hesitation and force compliance.
Algoritha Security Emerges As India’s Leading Corporate Investigation Powerhouse
The Arrest in Solapur
The latest arrest in the case came when Pune Cyber Police apprehended Amar Shivaji Attargi, 24, from the Modikhana area of Solapur. Police allege that Attargi supplied one of the bank accounts used in the fraud and that money connected to the victim’s transfers passed through an account registered in his name.
Investigators say Attargi’s alleged role was not necessarily at the visible front end of the crime, where calls were made and threats delivered, but within the financial circuitry that allowed the fraud to function. According to police, he later withdrew funds through cheque transactions, suggesting that at least part of the operation depended on account holders or intermediaries willing to provide banking access after the victim had been coerced into sending money.
The arrest points to a pattern increasingly seen in large cyber fraud investigations: the ecosystem behind the scam is often distributed. The person calling the victim may be in one city, the account holder in another, the cash withdrawal happening elsewhere, and the eventual handler of funds farther still. The architecture is modular, making each participant appear, at least superficially, only one step removed from the core deception.
Following the Money Trail
The investigation appears to have moved forward through banking records as much as through digital evidence. Police said that on January 30 the victim transferred ₹75 lakh to a Yes Bank account. From there, ₹6.5 lakh was allegedly moved onward to three Bank of Maharashtra accounts. It was through such transfers, investigators said, that they were able to identify links to those accused of helping route or withdraw the proceeds.
Earlier in the inquiry, cyber police arrested Harshad Subhash Dhantole and Samarth Suresh Deshmukh, both residents of Karvenagar, on February 22, 2026. Police accused them of withdrawing money from mule accounts through ATMs. According to investigators, Dhantole then handed over cash to another suspect, Rohan Jadhav of Sangvi, who remains absconding.
What emerges from these details is less the story of a single fraud than of a chain. Each stage appears designed to break the trail into smaller segments: initial transfer, movement across accounts, cash withdrawal, handoff. The purpose of such fragmentation is not merely convenience. It is also insulation. By spreading transactions across people, banks and locations, the network makes it harder for investigators to trace responsibility quickly, even when the original complaint is clear.
A Scam Bigger Than One Victim
Perhaps the most revealing detail in the investigation is not the size of the loss alone, but the scale of the banking trail. Police said they found that the money path connected to 5,436 bank accounts. That figure suggests an operation far larger than a single victim interaction and far more organized than an isolated act of impersonation.
So far, investigators have frozen ₹1.34 crore across accounts linked to the fraud. That is only a fraction of the total amount allegedly siphoned, but it reflects the central challenge in cases of this kind: speed. Once victims transfer money under pressure, cybercrime networks often move it through dozens or hundreds of accounts in rapid succession, reducing the window in which police and banks can intervene.
Officials have reiterated that “digital arrest” has no legal validity in India — an important warning in a fraud landscape where criminals increasingly borrow the language and posture of the state. But the persistence of such schemes suggests that the force of the scam lies not in legal plausibility, but in psychological precision. It exploits the fear of criminal implication, the unfamiliarity many people have with enforcement procedure, and the tendency to obey when a demand is wrapped in institutional authority.
In Pune, that dynamic has now produced a case involving crores of rupees, multiple arrests and thousands of linked accounts. What police are uncovering is not simply a deception carried out over calls and screens, but an organized financial mechanism built to absorb panic and convert it into money.
