How Did Delhi Police Capture Two Cybercriminals Impersonating Bank Officials?

Synopsis
Key Takeaways
- Be cautious of unknown callers claiming to be bank officials.
- Do not click on suspicious links sent via messages or calls.
- Monitor your bank account regularly for unauthorized transactions.
- Report any suspicious activities to the authorities immediately.
- Educate yourself about cybersecurity measures to protect your personal information.
New Delhi, July 24 (NationPress) The Delhi Police have apprehended two cybercriminals accused of posing as bank officials to deceive individuals out of their funds. The individuals were identified as Shankar Dan, 27, and Pradeep Kumar Dan, 26, both residents of Dhanbad, Jharkhand. Shankar was detained in Jharkhand, while Pradeep was captured in Birbhum, West Bengal.
A team from the Cyber Police Station in the South-West District executed the arrests following a complaint lodged on June 30. In conjunction with their apprehension, six smartphones were seized, including the device used for making calls and the one utilized to operate the BillDesk application during the fraudulent activities.
In a statement to the media on Thursday, the police reported that a case of cyber financial fraud was initiated based on a complaint, where the complainant stated that on June 30, he received a call from an unidentified number.
The caller falsely claimed to be a representative of SBI Bank, informing the complainant about bounced cheques. Under the guise of verifying cheque images, the fraudster sent a malicious link via WhatsApp. Upon clicking the link and installing the attached .APK file, the complainant found no cheque images as claimed.
Upon realizing the situation was dubious, he quickly disconnected the call, deleted the link, and turned off his phone. However, after restarting his device, he began receiving numerous SMS alerts regarding password changes and unauthorized transactions. Eventually, it was discovered that two of his fixed deposits—worth Rs 5,62,000 and Rs 4,54,000—had been closed prematurely. Additionally, Rs 48,600 was deducted via Google Ads.
The investigation revealed that the OTPs generated during these transactions were redirected to an unknown number. The total financial loss suffered by the complainant amounted to Rs 10.64 lakh from his Bandhan Bank account due to this fraudulent act. Following a preliminary inquiry, a case was registered at the Cyber South West Police Station under FIR No. 007/2025.
The police's statement indicated that the investigation primarily aimed to trace the money trail and identify the calling number used in the crime.
“The defrauded sum of Rs 10.64 lakh was initially transferred from the complainant’s Bandhan Bank account to the BillDesk platform (an online payment gateway) through unauthorized access via a malicious link/.APK file. The funds were then used for payments on an Axis Bank credit card and Google ADS services,” the statement noted.
Based on technical analysis and data obtained from BillDesk, authorities discovered that a specific mobile number and device were active in Dhanbad, Jharkhand. Further analysis confirmed the calling number was operational in the same region. Consequently, a team was formed to conduct raids across various districts in Dhanbad.
After several days of pursuit, aided by local and technical intelligence, the team successfully apprehended Shankar Dan. “Four mobile phones, including the calling device, were confiscated from him. Following his disclosure, and based on technical inputs, Pradeep Kumar Dan was arrested in Tarapith, District Birbhum, West Bengal, after raids in Bokaro, Ranchi, and Dhanbad. Two mobile phones were recovered from him, including the device used to operate the BillDesk application during the fraud on June 30, 2025,” the police reported.
During extensive interrogation, Shankar Dan confessed to using Amazon Pay to identify potential victims. He randomly entered mobile numbers into the Amazon Pay app, which revealed the associated bank for each number. He then contacted victims while impersonating a bank representative or manager, fabricating issues like KYC updates, credit/debit card problems, or bounced cheques.
.APK file/link via WhatsApp, claiming it contained images of the bounced cheque. Once the victim installed the application, unauthorized access to the bank account was obtained. He then transferred the stolen amount from the complainant’s account to the BillDesk application, which was further routed to Axis Bank credit cards (procured specifically for fraudulent activities) and used for settling bills on Google ADS services.”
The funds were later withdrawn from these credit cards using third-party apps like CRED and MobiKwik, and utilized for purchasing gift cards.
During the investigation, Shankar Dan further disclosed that the SIM cards employed in the fraud were sourced from Jamtara, and the .APK file was arranged through WhatsApp. The credit cards were supplied by accomplices to receive the stolen funds.
The accused claimed he received a substantial commission of 50 percent for his involvement in the fraud, earning approximately Rs 5 lakh, while the remaining amount was distributed among other members of the syndicate.
Shankar Dan primarily handled the calls to victims. He, along with Pradeep and others, was actively engaged in the criminal operation, which took place from forested areas near their village to avoid detection.
During interrogation, Pradeep Kumar Dan also acknowledged his active role in the crime. He operated the BillDesk application during the fraud and closely collaborated with Shankar Dan. After deceiving the victims over calls and gaining access to their bank accounts, Pradeep transferred the funds from the bank accounts to the BillDesk platform and then to Axis Bank credit cards. He received a 20 percent commission for his involvement, the police stated.