Gujarat Police bust AI deepfake loan scam: 7 arrested, Aadhaar breached

Share:
Audio Loading voice…
Gujarat Police bust AI deepfake loan scam: 7 arrested, Aadhaar breached

Synopsis

Gujarat Police have cracked an inter-state fraud ring that weaponised AI tools like Gemini and Meta AI to create eye-blinking deepfake videos from social media photos, bypass Aadhaar biometric checks, hijack DigiLocker accounts, and take out loans in victims' names — exposing alarming gaps in India's digital identity infrastructure.

Key Takeaways

The Ahmedabad Cyber Crime Branch has arrested 7 accused in an inter-state AI deepfake loan fraud; one suspect, Oli Ullah , remains absconding.
The gang used Gemini and Meta AI to create eye-blinking deepfake videos from social media photos to bypass Aadhaar biometric verification .
Victims' Aadhaar-linked mobile numbers were changed via CSC centres , giving fraudsters full access to DigiLocker , OTPs, and banking platforms.
Instant loans of ₹25,000 to ₹50,000 were obtained per victim; the racket reportedly earned ₹10 lakh to ₹15 lakh annually.
Masterminds identified as Kazimuddin, 49 , and Rabbul Hussain, 24 , both from Morigaon district, Assam .
Police have flagged serious loopholes in Aadhaar's digital identity verification ecosystem to authorities.

The Ahmedabad Cyber Crime Branch has arrested three more accused in an inter-state cyber fraud racket that allegedly used artificial intelligence-generated deepfake videos to manipulate Aadhaar authentication systems, illegally alter registered mobile numbers, and obtain loans in the names of unsuspecting victims. The latest arrests bring the total number of accused in the case to seven, with one suspect — Oli Ullah from Assam — still absconding.

How the Scam Operated

According to investigators, the gang first harvested GST numbers and PAN card details of financially stable individuals through platforms such as MastersIndia and Peridot. They then allegedly accessed CIBIL reports via CRIF High Mark to retrieve victims' mobile numbers, and used Telegram bots to identify Aadhaar-linked numbers.

Photographs of targets were sourced from digital payment and social media platforms including PhonePe, Google Pay, WhatsApp, Truecaller, Facebook, and Instagram. Using AI platforms including Gemini and Meta AI, the accused allegedly created so-called eye-blinking deepfake videos from static photographs to mimic live facial movements and bypass Aadhaar biometric verification systems linked to Aadhaar UCL kits.

"The accused used highly advanced techniques to bypass digital verification systems. They created AI-generated eye-blinking videos from Aadhaar photographs to mimic live biometric authentication," a Cyber Crime Branch officer said.

Aadhaar Numbers Changed, Bank Accounts Opened

Investigators said the gang exploited loopholes in digital identity verification by using CSC centres to submit requests for changing Aadhaar-linked mobile numbers. Once a victim's registered mobile number was replaced with a SIM card controlled by the accused, they allegedly gained access to DigiLocker accounts, OTPs, Aadhaar-enabled services, and banking platforms tied to the victim's identity.

Cyber Crime DCP Dr Lavina Sinha said: "Once the mobile number was changed, they gained full access to DigiLocker and banking services. They then opened bank accounts, took personal loans and transferred the money across multiple accounts."

The accused allegedly accessed platforms including the National Informatics Centre's DigiLocker, UIDAI Online Services, IDFC Bank, Kotak Mahindra Bank, City Union Bank, and Jio Payments Bank. Instant personal loans — typically ranging from ₹25,000 to ₹50,000 — were obtained through platforms including RKBANSAL, TRUE CREDITS, and EARLYSALARY, with proceeds routed through multiple accounts to evade detection. The racket reportedly generated annual revenue of nearly ₹10 lakh to ₹15 lakh.

The Accused and Their Roles

The three newly arrested individuals are Krishna Prajapati, 22, a resident of Kushinagar district, Uttar Pradesh; Kazimuddin, 49, from Morigaon district, Assam; and Rabbul Hussain, 24, also from Morigaon district. Police identified Kazimuddin and Rabbul Hussain as the masterminds behind the fraud network.

According to investigators, Rabbul Hussain — reportedly pursuing a B.Com degree — allegedly handled AI tools and digital identity theft operations alongside the absconding Oli Ullah. Kazimuddin allegedly allowed fraudulent loan proceeds to be routed through his bank accounts in exchange for commission. Krishna Prajapati, who operated a settlement centre business, allegedly supplied victims' Aadhaar numbers, photographs, and mobile data to previously arrested accused Deep Gupta in exchange for commission payments.

How the Case Came to Light

The investigation began after an Ahmedabad businessman complained that he had suddenly stopped receiving OTPs linked to his Aadhaar-enabled payment system. Initially believing it to be a technical glitch, he later discovered that his Aadhaar-linked mobile number and biometric details had allegedly been altered without his knowledge, and loans had been taken in his name.

The case was registered at the Cyber Crime Police Station, Ahmedabad City, under Bharatiya Nyaya Sanhita, 2023 Sections 61(2)(a), 336(2) and 336(3), along with Sections 43(a), 43(b), 43(i), 66 and 66(C) of the Information Technology Act. Earlier arrests in Kushinagar were led by PI N.R. Gamit, while the latest arrests in Assam were carried out by PI J.P. Thakor and his team using technical surveillance, digital analysis, and human intelligence.

Systemic Gaps Flagged to Aadhaar Authorities

Police said they have formally informed Aadhaar authorities of what investigators described as "serious loopholes" in the digital identity verification ecosystem that the gang allegedly exploited. A local Aadhaar kit operator is also alleged to have helped facilitate illegal modifications to Aadhaar-linked records. Officials said interrogation of the arrested accused is continuing to identify additional victims and uncover the full extent of the interstate network.

Point of View

Designed to extend government services to the last mile, were allegedly turned into entry points for identity hijacking. India has built an ambitious digital public infrastructure stack — Aadhaar, DigiLocker, UPI — but this case reveals that the security architecture has not kept pace with the offensive capabilities of even moderately resourced criminal networks. The systemic fix cannot wait for the next arrest.
NationPress
10 May 2026

Frequently Asked Questions

How did the Gujarat AI deepfake loan scam work?
The accused collected victims' photos from social media and used AI tools like Gemini and Meta AI to create eye-blinking deepfake videos that mimicked live facial movements. These videos were used to bypass Aadhaar biometric verification, after which the gang changed victims' Aadhaar-linked mobile numbers via CSC centres and accessed DigiLocker and banking platforms to take out loans in victims' names.
Who are the main accused in the Ahmedabad cyber fraud case?
Police identified Kazimuddin, 49, and Rabbul Hussain, 24, both from Morigaon district in Assam, as the masterminds. Krishna Prajapati, 22, from Kushinagar, Uttar Pradesh, allegedly supplied victim data. One accused, Oli Ullah from Assam, remains absconding. The total number of arrested accused stands at seven.
What platforms and banks were compromised in this scam?
The accused allegedly gained unauthorised access to DigiLocker, UIDAI Online Services, IDFC Bank, Kotak Mahindra Bank, City Union Bank, and Jio Payments Bank. Loans were obtained through platforms including RKBANSAL, TRUE CREDITS, and EARLYSALARY.
How much money did the fraud ring make?
According to police, the racket generated annual revenue of approximately ₹10 lakh to ₹15 lakh through fraudulent loan transactions, with individual loans typically ranging from ₹25,000 to ₹50,000 per victim.
What systemic vulnerabilities did the scam expose?
Police have formally flagged serious loopholes in Aadhaar's digital identity verification ecosystem to authorities. The case revealed that CSC centres could be exploited to change Aadhaar-linked mobile numbers, and that commercially available AI tools were sufficient to bypass biometric authentication systems.
Nation Press
The Trail

Connected Dots

Tracing the thread behind this story — newest first.

8 Dots
  1. Latest 5 days ago
  2. 3 weeks ago
  3. 1 month ago
  4. 1 month ago
  5. 2 months ago
  6. 2 months ago
  7. 4 months ago
  8. 11 months ago
Google Prefer NP
On Google