What Actions Are Being Taken in the Cyber Fraud Case in J&K’s Ganderbal District?

Synopsis
Key Takeaways
- The Enforcement Directorate (ED) is actively investigating a significant cyber fraud case.
- Search operations were conducted in Kangan, J&K, leading to the seizure of properties and electronic devices.
- Over Rs 53 crore was credited to the accounts of the accused individuals.
- The fraud involved a bank employee deceiving victims into investing in a fraudulent scheme.
- State investigation agencies are also involved in the ongoing investigation.
Srinagar, Sep 29 (NationPress) The Enforcement Directorate (ED) has confiscated properties and electronic devices following raids in the Kangan region of Jammu and Kashmir's Ganderbal district linked to a significant cyber fraud case, as confirmed by an official on Monday.
According to a statement from the ED, the Srinagar Zonal Office executed search operations across various locations in Kangan, Ganderbal district, under the Prevention of Money Laundering Act (PMLA), 2002.
The raids took place on September 24, 2025, as part of an investigation into a cyber fraud orchestrated by a bank employee from Jammu and Kashmir Bank Ltd, identified as Shahnawaz Ahmed Shah, alongside other accomplices.
The ED initiated its investigation based on a First Information Report (FIR) lodged by the J&K Police for offenses under section 318(4) of BNS (equivalent to section 420 of the IPC, 1860), prompted by a complaint from Firdous Ahmad Dar. Dar alleged that Shahnawaz Ahmed Shah, a Probationary Officer at J&K Bank in Kangan, and Amir Bashir, deceived him into investing in a financial scheme that promised lucrative returns through online trading.
Dar disclosed his personal and banking details to Shah, who then allegedly utilized his account for dubious transactions. Shah purportedly persuaded Dar to transfer Rs 5 Lakh to his father Ghulam Nabi Shah's account, assuring immediate returns, which were never realized.
Furthermore, it was uncovered that Shah's sister, Rumaisa, and her fiancé, Dr. Aamir, were also implicated in enticing locals with assurances of guaranteed profits.
They reportedly profited significantly from this illicit scheme. Following the recording of the Enforcement Case Information Report (ECIR), the ED scrutinized the bank accounts of the individuals mentioned, uncovering a total credit of Rs 53 crore, although these accounts contained no substantial remaining balances.
To trace the Proceeds of Crime, the ED conducted searches and retrieved information and documents related to certain USDT trading accounts on Binance, as well as both immovable and movable assets. Additionally, electronic devices suspected to be employed in executing the fraud were seized, with ongoing investigations to follow.
It is noteworthy that the state investigation agency (SIA) of the J&K crime branch has also registered an FIR in this high-stakes cybercrime case, conducting searches across multiple sites in the Kangan area.