logo
Bot bazaar busted: Crackdown restricts online operations of Tatkal e-ticketing racket

Bot bazaar busted: Crackdown restricts online operations of Tatkal e-ticketing racket

India Today20 hours ago
The online network of Tatkal ticketing agents, employing bots to grab tickets before genuine travellers, appears alarmed following India Today's exposure of their operations, tactics, and network.Our investigation into the racket found that agents were using unauthorised platforms to book Tatkal tickets in under 60 seconds. These platforms relied on bots and stolen Aadhaar-verified IRCTC accounts, putting user data at risk.advertisementThese agents, accompanied by techies who developed the bots, and fake service providers, exploited loopholes in the IRCTC booking system and used Telegram and WhatsApp accounts for their operations.
India Today identified over 40 active groups on Telegram and WhatsApp. Some dissolved after the report, while others shifted to more closed and covert channels of communication. Many also wiped their message history to erase traces of their operations.A WhatsApp group named 'Jai Shree Ram Bhai Tatkal Materials' changed its name to 'Jai Shree Ram Bhakton Ka Parivaar' in an attempt to avoid suspicion. Shortly after, the group admin informed members to join a secret backup group, admitting that their details had been exposed in news reports.
Telegram and WhatsApp channels began sharing booking details using the view-once feature to avoid detection.Another group with 851 members, named 'Ocean Extension', was deleted by its admin. The group not only sold Tatkal tickets to users but also offered Tatkal booking software to agents. Its website, which sold bots designed to steal data and speed up bookings — effectively overwhelming the system for genuine users — also disappeared.A WhatsApp group named 'IRCTC Tatkal Update 2.0', which had 194 members and was engaged in the same business, was also deleted.
LIMITED IMPACTBut the job is far from done. While groups with traceable digital footprints were swiftly taken down, many others continue to operate with full force, using virtual private servers (VPS) to mask their IP addresses.One group, with at least 900 members, continues to openly sell the 'Ezyride Tatkal Service' bot to agents. A related website, tatkalworld.com, also offers VPS services and proxy IPs to mask users' identities. Notably, the site was created just three months ago.advertisementOperators and agents are now using international phone numbers to mask their identities.'The reality is there will be no lasting impact on the ground,' Triveni Singh, former IPS Officer, Cybercrime told India Today. 'Within minutes, new channels will be set up, new IDs will be used, and the racket will continue. This is part of a massive operation spanning every state in the country, with countless agents using cheaply available bots. At best, they may shift to private Telegram groups or the darknet — but it's not going to stop.'According to Singh, the only way to curb this is through an AI-powered platform developed by the government that would use multiple parameters like geo-fencing, where only a person with a UP Aadhaar number can book tickets for someone else within UP, and AI-based profiling to track the number of times each ID is used. 'Only then can the racket be effectively restricted,' he said.- Ends
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Commercial Tax Dept. unearths inter-State GST racket by nabbing Rajasthan ‘fake bill trader' who facilitated bogus input tax credit claim of ₹39 crore
Commercial Tax Dept. unearths inter-State GST racket by nabbing Rajasthan ‘fake bill trader' who facilitated bogus input tax credit claim of ₹39 crore

The Hindu

time7 minutes ago

  • The Hindu

Commercial Tax Dept. unearths inter-State GST racket by nabbing Rajasthan ‘fake bill trader' who facilitated bogus input tax credit claim of ₹39 crore

Karnataka Commercial Taxes Department officials have unearthed a multi-State GST racket and arrested a Rajasthan-based 'fake bill trader' who had allegedly facilitated the fictitious transfer of input tax credit (ITC) of ₹39 crore under Goods and Services Tax (GST) to various manufacturers through fake firms in Karnataka. According to sources in the Commercial Taxes Department, fake bill trader Kailash Bishnoi, a resident of Jalore district in Rajasthan, was taken into custody in Bengaluru on Tuesday by a team comprising officers from the department's South Zone and Vigilance Division in coordination with the Bengaluru East police team. 17 fake firms Department sources said Bishnoi had created 17 fake firms in Karnataka that have shown a total turnover of ₹208 crore, based on which nearly ₹39 crore of ITC was passed on to some manufacturers. Sources noted that ₹39 crore was a financial burden caused by Bishnoi on Karnataka alone. Bishnoi was involved in the creation of fake GST registrations and bank accounts by fabricating Aadhaar cards, using which tax invoices were issued to the tune of several hundred crores to facilitate the fictitious movement of goods in metal scrap and facilitating the claim of bogus ITC by recipients, the department sources said. Investigation into the case is learnt to have revealed that he has operated in Chhattisgarh, Madhya Pradesh, Rajasthan, Telangana, Andhra Pradesh, Tamil Nadu, and Karnataka, creating fake firms and issuing tax invoices in association with his team members. The total quantum of the fraud would be much higher if the losses caused to other States is taken into account, officials explained. The arrest of his associate Rohit alias Rohtash in December 2024 and gathering of several incriminating material and digital evidences pointing to their crime finally resulted in the department officials nailing Bishnoi. Many fake documents In September 2023, the accused, along with his accomplices, tried to open 10 bank accounts by providing fake names, Aadhaar cards and PAN cards in HDFC Bank's Murugeshpalya branch in Bengaluru. The bank's branch manager had noticed this and filed a complaint with the Jeevan Bima Nagar police. The investigation team of the Bengaluru East police and the Commercial Taxes Department visited Rajasthan twice to track Bishnoi in the last six months. But he remained elusive as he was on constant move, changing locations in multiple States and using 14 mobile phone numbers to evade being tracked, sources said. Finally, he was arrested on Tuesday by the warrant of the Special Court for Economic Offences, Bengaluru, and given custody for further inquiry. Officers of the Commercial Taxes Department are continuing their investigation and analysing his actions from various angles. Ninth such case Incidentally, this is the ninth such case being traced in the last 15 months by the Karnataka Commercial Taxes Department which is continuing its pursuit against such offences to ensure equitable taxation and safeguard the interests of both the State and its honest taxpayers.

Udupi resident loses over ₹5 lakh to online investment fraud,
Udupi resident loses over ₹5 lakh to online investment fraud,

The Hindu

time10 minutes ago

  • The Hindu

Udupi resident loses over ₹5 lakh to online investment fraud,

An Udupi resident allegedly lost ₹5.42 lakh to an online investment fraud a few days ago. In the compliant to Udupi Cyber Economic and Narcotic (CEN) crime police station, the victim said that on June 13, he was added to 'Chearles Schwab 20 gold foreign exchange trading group' on Telegram app. On being assured of good returns, he transferred a total of ₹5,42,500 to different accounts of the members of the group. When he asked members to return the invested amount, they requested that he send more money. Realising that he had been cheated, the victim filed a complaint, which was registered for offences under Sections 66(C) and 66(D) of the Information Technology Act and under Section 318(4) of the Bharatiya Nyaya Sanhita. ISKCON staff duped A fraudster allegedly duped an ISKCON staff of ₹26,000 by posing as a transporter who wanted to donate funds to ISKCON. In a complaint to Mangaluru's Surathkal police, the victim said a person called him on July 6 evening. The caller introduced himself as Rahul, owner of Balaji Transport in Yeyyadi in Mangaluru and expressed his desire to make a donation to ISKCON. He sent a message to the victim about the transfer of ₹1. He then sent another message transferring to the ISKCON account a sum of ₹ 30,000 and asked the victim to return ₹ 26,000 by stating that he had inadvertently sent a higher amount. Believing the caller's message, the victim returned ₹26,000. The caller then sent a message transferring ₹40,000 and asked the victim to return the amount. The victim could not return the amount to the caller. The victim then checked the ISKCON account and realised that no amount from the fraudster was credited to the ISKCON account. The victim filed a complaint, which was registered by the Surathkal police.

Beware: This traffic challan message can drain your bank account
Beware: This traffic challan message can drain your bank account

India Today

time15 minutes ago

  • India Today

Beware: This traffic challan message can drain your bank account

The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store