Operation Chakra-V: Delhi-Noida-Chandigarh Hub of Cyber Fraud Network Dismantled by CBI

Advertisment

The CBI dismantled a large-scale cyber fraud setup called a "phishing SMS factory." This factory used an online platform to control approximately 21,000 SIM cards. These SIM cards were illegally obtained, violating Department of Telecommunications (DoT) rules. 

The organized cyber gang operated from locations like Delhi, Noida, and Chandigarh and provided bulk SMS services to cybercriminals, including foreign operators targeting Indian citizens.

How the Cyber Gang Ran the Phishing Factory

The system of the cyber gang included servers, communication devices, USB hubs, dongles, and thousands of SIM cards. This advanced infrastructure allowed for the daily dispatch of lakhs of fraudulent messages across India. These messages offered fake loans, investment opportunities, and other financial benefits. 

Advertisment

The aim was to steal personal and banking details from innocent people. The infrastructure was allegedly run by a registered company, M/s Lord Mahavira Services India Pvt. Ltd.

The scale of the compromised SIM card infrastructure, over 20,000 connections, suggests an unparalleled operational logistics mastery. The danger lies not in the fraud per se, but in the complexity and level of sophistication of undermining the basic telco security protocols to this extent and scale. It also proves that there is some fault in the telco channel partner chain since fraud-carrying infrastructure has been able to get itself listed as a business concern.

Illegal SIMs and Financial Trail: Unearthing the Fraud's Infrastructure

Advertisment

The investigation uncovered that about 21,000 SIM cards were procured in violation of DoT rules. The firm provided false end-user lists to obtain multiple SIMs using the same IDs. For example, 90 SIMs were issued for only ten people. Early findings suggested the involvement of telecom channel partners and their employees. 

Some SIMs operated across 203 to 387 IMEIs, generating one-second automated calls. This pattern is consistent with SIM box operations and IMEI tampering, which are prohibited by DoT guidelines. The financial trail revealed a layered and complex money-laundering process.

The money was routed through different payment gateways and UPI channels. A substantial portion of it was turned into cryptos and gold. The investigation also uncovered that the amount of money gathered has been layered and routed through different payment gateways, UPI channels, and cryptocurrency exchanges. 

Advertisment

The money has also been sent back to foreign countries through different illicit channels. Indian nationals were involved in these illegal operations under foreign-controlled organizations for illicit gaming and investment fraud.