Mumbai Police have busted a multi-tier cyber fraud network that stretched across Maharashtra, Bihar, and Jharkhand, involving fake identity documents, forged bank accounts, and e-commerce scams.
The investigation began in March 2025, when MRA Marg Police noticed suspicious activity involving individuals living in dormitories under fake identities. Acting on a tip-off and under the guidance of DCP Pravin Mundhe (Zone 1), police raided a dormitory and arrested three key suspects: Umeshkumar Paswan (32), Amankumar Dilip Parsad (23), and Rahul Kumar Verma (30) — all originally from Bihar.
The trio, forming the first chain of the racket, used a mobile app called ‘Print Portal’ to forge Aadhaar and PAN cards. These fake IDs were then used to open bank accounts in various cities, which were sold for Rs20,000 to Rs25,000 each.
Their targets? Google searches led them to nationalised banks where they could exploit KYC processes using the forged documents.
These accounts were sold to the second chain — intermediaries based in Gaya, Bihar, identified as Mukesh Kumar alias Chandu Chandravanshi and Anees alias Raj Kumar Singh. They bought the fake accounts and passed them on to cybercriminals in Jamtara, keeping a 30% cut of all fraud proceeds.
🎣 Jamtara Scammers and Modus Operandi
The third chain, operating from Jamtara, used these accounts to execute cyber frauds. Impersonating employees from Amazon, Flipkart, Myntra, and even offering fake PM-Kisan Yojana loans, they tricked victims into revealing sensitive banking details and siphoned off funds.
On March 12, Gaya police arrested Kumar and Singh. A week later, on March 22, they nabbed Abdullah Ansari (34) in Jamtara — a key player in the fraud execution phase.
“The gang was sophisticated, organised, and well-connected across states. More arrests are likely,” said a senior police officer.
Each group in the network had a clear role:
First chain: Created fake accounts
Second chain: Acted as brokers
Third chain: Committed the actual cyber fraud
The fraudsters earned lakhs through this well-oiled operation, exploiting tech gaps and identity verification systems.