Delhi Police arrest sextortion kingpin Abas Khan from Mewat, recover ₹2.52 lakh fraud

Share:
Audio Loading voice…
Delhi Police arrest sextortion kingpin Abas Khan from Mewat, recover ₹2.52 lakh fraud

Synopsis

Delhi Police smashed a sextortion racket centred in Mewat, arresting kingpin Abas Khan for orchestrating fake-profile schemes that preyed on unsuspecting men via Facebook and WhatsApp. The ₹2.52 lakh fraud case revealed a larger organised network, with investigators now hunting other operatives and potential victims across the region.

Key Takeaways

Abas Khan , 25, arrested from Mewat region in Alwar district, Rajasthan for running a sextortion racket.
The accused extorted ₹2.52 lakh from a Shalimar Bagh resident via fake Facebook profiles and WhatsApp video calls.
E-FIR registered on 12 January under the Bharatiya Nyaya Sanhita . iPhone 14 Pro recovered from the accused, allegedly used to record and blackmail victims.
Investigation reveals a larger organised network involving youths from the accused's village in similar cyber fraud activities.

Delhi Police's North-West district cyber unit on Wednesday arrested Abas Khan, 25, identified as the alleged kingpin of a sextortion racket operating from the Mewat region in Rajasthan's Alwar district. The breakthrough came after a detailed investigation into cyber fraud involving extortion of ₹2.52 lakh from a Shalimar Bagh resident.

How the sextortion scheme operated

The victim reported receiving a Facebook friend request from a woman's profile, who later obtained his mobile number. During a subsequent WhatsApp video call, obscene content was played while the victim was recorded without his knowledge. The accused then threatened to release the purported video publicly unless the victim paid money. Under duress, the victim transferred ₹2.52 lakh across multiple transactions.

Investigation and arrest

An electronic First Information Report (e-FIR) was registered on 12 January under relevant sections of the Bharatiya Nyaya Sanhita. Police analysed digital footprints including WhatsApp account data, Facebook profiles, Internet Protocol Detail Records (IPDRs), Call Detail Records (CDRs), and bank transactions. The investigation revealed multiple accounts operated through mule identities. Technical surveillance and ground intelligence eventually traced the operation to the Mewat region. A carefully coordinated raid was conducted in the early hours, and Khan was arrested. Police recovered an iPhone 14 Pro allegedly used in the crime.

Modus operandi uncovered

During interrogation, Khan confessed to creating fake social media profiles using photographs of women and sending bulk friend requests to target men. Once a victim engaged, he would initiate a video call and play pre-recorded obscene clips while secretly recording the victim's reaction. These recordings were weaponised to blackmail victims into payments.

Larger network suspected

Police indicated that Khan was a key operator within a broader sextortion network, with further investigation underway to identify and arrest other members. Officials noted that several youths from the accused's village are suspected to be involved in similar cyber fraud activities, suggesting an organised racket spanning multiple operatives.

What's next

The investigation continues as police work to dismantle the wider network. Authorities are also examining whether other victims exist and coordinating with cyber units in adjacent states to track related cases.

Point of View

Targeting urban professionals via social engineering. The fact that multiple youths from one village are suspected indicates this is not opportunistic crime but a coordinated racket with clear division of labour. Delhi Police's ability to trace cross-border digital footprints is commendable, but the real challenge is prevention — victim awareness campaigns and stricter platform verification remain absent.
NationPress
10 May 2026

Frequently Asked Questions

Who is Abas Khan and what was his role in the sextortion racket?
Abas Khan, 25, from Alwar district in Rajasthan, was the alleged kingpin of the sextortion network. He created fake social media profiles using women's photographs, sent bulk friend requests to target men, initiated video calls with pre-recorded obscene content, and recorded victims' reactions to blackmail them into paying money.
How much money was extorted in this case?
The victim in this case transferred ₹2.52 lakh across multiple transactions after being threatened with the release of an allegedly recorded video.
When was the e-FIR registered and under which law?
The e-FIR was registered on 12 January under relevant sections of the Bharatiya Nyaya Sanhita, India's new criminal code.
What evidence did police recover?
Police recovered an iPhone 14 Pro from Abas Khan, which was allegedly used to record victims and orchestrate the blackmail scheme.
Is this an isolated case or part of a larger network?
Investigation suggests this is part of a larger organised racket. Several youths from Khan's village are suspected to be involved in similar cyber fraud activities, indicating a coordinated operation with multiple operatives.
Nation Press
The Trail

Connected Dots

Tracing the thread behind this story — newest first.

8 Dots
  1. Latest 5 days ago
  2. 2 weeks ago
  3. 3 weeks ago
  4. 3 months ago
  5. 5 months ago
  6. 5 months ago
  7. 9 months ago
  8. 11 months ago
Google Prefer NP
On Google