
Four arrested in SIM box racket with links to Cambodia
The investigation was triggered after the DoT, through its Chakshu portal, flagged suspicious activity linked to impersonation and fraudulent calls originating from the region. Technical inputs provided by the department identified a SIM box device connected to multiple International Mobile Equipment Identitys (IMEI), which allowed internet-based international calls to be disguised as local calls. With just one or two individuals operating them, fraudsters can manage and make a high volume of calls simultaneously, often used in scams involving impersonation, threats, or financial fraud, while evading detection.
The arrested individuals were identified as Yandrapu Kamesh, a 24-year-old unemployed polytechnic diploma holder from Parvathipuram, Andhra Pradesh; Bavu Bapaiah, a 43-year-old labourer from Laxmipur in Jagtial district; Bavu Madhukar, Bapaiah's 32-year-old younger brother; and Gotla Rajeshwer, a 40-year-old farmer from Kishtapur village. The group had been working under the remote direction of Polavalsula Sai Krishna, also known as Jack or Raju, who is currently absconding and was allegedly operating from Cambodia.
Investigations revealed that Bapaiah had travelled to Cambodia in mid-2024 and reconnected with Sai Krishna, whom he had initially met in Chandigarh while attempting to secure a visa. After returning to India in April 2025, Bapaiah was contacted by Krishna via WhatsApp and asked to arrange a rented house in Jannaram for setting up the SIM box operation. With assistance from his brother-in-law Rajeshwer, the location was secured, and soon after, telecom devices were shipped to Jagitial. Since Bapaiah was not at home, his brother Madhukar received the parcel and placed the equipment in the rented premises.
Subsequently, Krishna instructed the brothers to secure a high-speed Airtel broadband connection, which was arranged with the help of a local dealer. Kamesh, who had been approached via Telegram by Krishna and offered a monthly salary of ₹70,000, was brought to Jannaram to oversee the operation. He was responsible for installing the hardware, configuring the SIM panels, and inserting SIMs in batches to evade detection. Krishna also provided Kamesh with ₹3 lakh to purchase over 200 proofless SIM cards from a man named Simhadri in Parvathipuram, with financial transactions facilitated through another associate, Bonu Jayavardhan. The unverified SIMs were delivered in multiple consignments and used in the SIM box to route fraudulent calls.
The group managed to establish a decentralised yet technically coordinated setup capable of handling high call volumes. During the raid, officials seized five SIM box devices, over 230 SIM cards, a laptop, four mobile phones, a D-Link router, a modem, and an inverter, all configured for seamless telecom routing.
Efforts are now underway to trace Sai Krishna, Bonu Jayavardhan, who helped procure SIM cards; and Simhadri, who supplied the proofless SIMs. Investigators are also probing the role of telecom service providers and internet companies that may have issued SIM cards without proper verification.
Financial transactions linked to the operation are being scrutinised to trace the flow of money and identify any connections to larger call centre-based fraud networks.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Hindustan Times
2 hours ago
- Hindustan Times
Eighteen held for duping US citizens after sending bug to laptops
Eighteen people, including two women, were arrested on Friday for allegedly duping United States nationalsby sending a bug on their laptops via email, said police, adding that investigation is going on to assess the number of people duped. The suspects were operating from a rented accommodation in Noida, Sector 65, said police officials. A police officer involved in the investigation said the call center had been operating in the rented accommodation for the past two months. (Archive) Police said they received a tip-off that a call center involved in duping US citizens was operating in Noida. 'Upon receiving the information, a team was formed, and eighteen people were arrested,' said central Noida deputy commissioner of police (DCP), Shakti Mohan Avasthy. A police officer involved in the investigation said the call center had been operating in the rented accommodation for the past two months. 'It was revealed that they used to change locations every two to three months to avoid arrest,' he said, adding that the employees were hired by the gang leaders through Telegram and other social media platforms for salaries ranging between ₹25,000 to ₹40,000. Explaining their modus operandi, police said the gang leaders used to buy data of US citizens from US locals selling personal information, and employees hired by them were tasked with sending a bug via email, where they included their customer support number. After receiving the email, the target's laptop processor would slow down. After this, the victims would call the customer support number provided by the scammers and talk to them via voice-over-internet calls. 'Posing as customer support from an MNC, they gained access to the victims' laptop screens and threatened them that their bank credentials might leak due to bugs in their laptops,' said DCP Avasthy, adding that, under the pretext of providing help, they charged $250 to $300 from the victims. Police said the suspects have been identified as Dhruv Arora, 26, who was leading the call center, a resident of South Delhi; Akash Kumar, 27; Mayvo, 26; Saurabh Chandra, 26; Mohammad Fazul, 28, all residents of Delhi; Tarun Sharma, 36; Guruvindar Singh, 32; Pratyuman Sharma, 27; Gaurav Jasrotiya, 30; Kunal Rajvanshi, 29; Divyansh Bhadala, 28; Apurv Singh, 25; Ritu Rajput, 24; Sukrati Singh, 24; Mayur Nayak, 28, all residents of Noida; and Akash Tiwari, 25; Asmit Singh, 27; Harman Preet, 29, all residents of Faridabad. Twenty-three laptops, twenty-five headphones, and other electronic gadgets were recovered from their possession, said police adding that a case under sections of cheating (318) and cheating by personation(319) of BNS was registered at Phase 3 police station and further investigation is underway. .


Hindustan Times
3 hours ago
- Hindustan Times
Online bullying can be as mentally traumatic as physical violence: Delhi HC
Cyberbullying can be as mentally traumatic and scarring as physical violence, the Delhi High Court has said, while upholding the conviction of a man who sent morphed nude images and threatening messages to a minor girl studying in Class 9. The judgment, delivered on July 28 by Justice Swarana Kanta Sharma, stressed the devastating psychological impact of online harassment, particularly on children. (HT Archive) The court rejected his appeal against a five-year sentence, describing the case as a 'textbook example of cyberbullying.' The judgment, delivered on July 28 by Justice Swarana Kanta Sharma, stressed the devastating psychological impact of online harassment, particularly on children. 'What is deeply concerning is the use of technology to commit cyberbullying – an act that, while faceless and silent, can be as mentally traumatic and scarring as physical violence, especially when directed towards children. Such conduct, in the virtual world, has very real and devastating consequences in the real world,' justice Sharma said. The conviction stems from a complaint filed in September 2016 by the victim's mother. The minor girl, then in Class 9, was using a tablet for studying when she received morphed obscene images of herself along with threatening messages on WhatsApp. The sender, a man known to the family, warned her that the photos would be circulated if she didn't comply with his demands. The trial court in March last year had convicted him under various provisions of the Indian Penal Code including sexual harassment, stalking, criminial intimidation, sections 12 (sexual harassment) and 14 (using child for pornographic purposes) of Protection of Children from Sexual Offences (Pocso) Act, 2012 and section 67 (publishing or transmitting obscene material in electronic form) under the Information Technology Act. Challenging the verdict, the man claimed he was falsely implicated and that the case was full of contradictions. The Delhi Police, however, maintained that the evidence clearly showed he had transmitted obscene material and had criminally intimidated a minor. Justice Sharma, in her 35-page ruling, upheld the trial court's decision. She said that even the threat of circulating morphed images, without actually doing so, can cause irreparable long-term damage to a child's mental well-being and dignity. The act of morphing her face, the court added, sought to not only shame her but to coerce her by creating fear. 'A morphed image once created and circulated can have long-term consequences for a child's mental health, dignity, and reputation,' the judge observed. 'The fear of such circulation alone, even if the image is never actually published, is enough to terrorise a young mind.' The court also highlighted the urgent need to protect children in digital spaces. With growing reliance on gadgets for education, it said, the notion of child safety must extend beyond physical environments. 'This court is of the view that creating a safe environment for children cannot be restricted to physical spaces alone. The modern world demands that equal protection be extended to digital spaces, where children are now spending considerable time,' the court said.


Time of India
4 hours ago
- Time of India
Stock tip scam nets3cr: Four arrested
1 2 Hyderabad: Sleuths from the Telangana Cyber Security Bureau (TGCSB) have arrested four cyber fraudsters, including a city-based software consultant involved in a drone start-up, for duping a city businessman out of 3 crore through a fake stock market investment scheme. The victim, a businessman from North Lalaguda, informed the police that he was added to a WhatsApp group titled "SMC Global Securities" on April 14 by individuals identified as Anu Prita and Ajay. On June 19, the complainant was persuaded to subscribe to an initial public offering (IPO) and was pressured to transfer at least 3 crore for share allocation. Trusting the fraudsters, who assured him that the funds could be withdrawn at any time, the victim transferred the sum in 16 transactions to various bank accounts. You Can Also Check: Hyderabad AQI | Weather in Hyderabad | Bank Holidays in Hyderabad | Public Holidays in Hyderabad Although he was allowed to make a token withdrawal of 10,000, he was later informed that his account had gone into a negative balance. This prompted him to file a complaint with TGCSB on June 28. Investigators traced one bank account in Kerala that had received 77 lakh. Further examination revealed that 8 lakh had been routed to a current account with a leading private bank held in the name of "Drones Spray", a company started by Srinivas Manubothula (45), a software consultant from Narsingi, for his drone software start-up. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Duong 9b: Unsold Furniture Liquidation 2024 (Prices May Surprise You) Unsold Furniture | Search Ads Learn More Undo Police arrested Srinivas along with his alleged accomplices: Syed Yousuf (45); Chekka Yeshaya (54); and Mohammed Jaber Ahmed (42) All of them were arrested in Hyderabad. "Srinivas had incurred losses in the business he started in 2023 and was seeking investors. His friend Shekar, who supplies bank accounts to cyber fraudsters, introduced him to the others. Srinivas agreed to let them use his bank account in exchange for a 10% commission. They took the SIM card linked to Srinivas' bank account and, after routing 4.3 crore through it, returned the SIM card along with 2 lakh in cash," said TGCSB Director Shikha Goel.