A massive cyber fraud network has been exposed involving a fake police impersonation scam that targeted an influential religious figure in Madhya Pradesh. The case, which led to a loss of ₹2.53 crore, has unearthed a nationwide web of criminals, with money laundered through cryptocurrency and masterminded by a man known only as “Michael” under the command of a mysterious “Big Boss” no one has seen.
Spiritual Leader Targeted in Cross-Border Digital Arrest Scam
In a case that echoes the darkest depths of digital deception, a retired ashram secretary of the Ramkrishna Mission in Gwalior, Swami Supriyanand, became the unsuspecting victim of a fake digital arrest scam. The fraud was initiated by individuals posing as police officers from Maharashtra, who claimed he was under investigation. The elaborate con ended in a loss of ₹2.53 crore, transferred in multiple phases under threats and coercion.
Investigations revealed that the scam operated through a foreign-controlled cyber network, which converted the looted money into cryptocurrency and routed it abroad. The case was cracked when the victim filed a complaint after suspecting foul play. The Special Investigation Team (SIT) has so far arrested 19 individuals, including bank officials, young crypto mules, and handlers.
The Mastermind ‘Michael’ and the Mystery of the Invisible ‘Big Boss’
At the heart of the operation lies a man named Ravi alias Michael, believed to be the mastermind of the India-side coordination. Arrested from Lucknow, Ravi admitted to executing frauds on the instructions of someone he only referred to as “Big Boss”—a shadowy figure never seen or identified, whose voice commands reportedly came through VoIP channels and encrypted apps.
Ravi never saw this Big Boss but confirmed that post every successful fraud, the Big Boss would instruct SIM card destruction and fund laundering through crypto wallets. Ravi’s direct link was a foreign handler who ensured the funds were moved through shell accounts and hawala-like channels before being converted into USDT (Tether) and sent overseas.
ALSO READ: FCRF Launches Campus Ambassador Program to Empower India’s Next-Gen Cyber Defenders
The fraud network operated through tiered roles, with those opening mule accounts earning ₹5,000, while those withdrawing and managing accounts earned cuts between ₹10,000–₹60,000. A 10–15% commission was offered to local handlers for each converted transaction.
Girlfriend’s Call Helped Police Crack the Case
In a dramatic twist, Ravi—on the run and frequently switching SIM cards—called his girlfriend from a new number. This slip proved to be his undoing. The cyber crime cell tracked the call, triangulated his location using cell tower dumps, and arrested him shortly after.
The SIT noted that Ravi’s instructions from the Big Boss always included destroying SIM cards post-transfer, but his emotional lapse exposed him. From Madhya Pradesh to Gujarat and Uttar Pradesh, the scam’s operations extended across state borders and relied on social engineering, digital identity theft, and financial layering.
SIT’s Next Steps: Crypto Trail, International Links, and More Arrests
The SIT continues to trace the cryptocurrency trail, coordinating with national and international financial intelligence units to uncover where the USDT assets were finally routed. Early indicators suggest connections with cybercrime hubs in Southeast Asia, possibly Cambodia or Laos, already known for running digital arrest scam factories.
Law enforcement agencies are now focusing on:
- Cracking encrypted communications to identify the Big Boss
- Freezing wallet addresses and crypto exchange accounts
- Investigating bank insiders and KYC enablers
