
Businessman Gopal Khemka murder: Accused killed in police encounter in Bihar; was suspected conspirator in case
JD(U) leader Rajeev Ranjan said the accused was killed after he tried to attack police.
"As per the information we have received, Police have killed an accused in the Khemka murder case who tried to attack police. Nitish Kumar ji is monitoring every incident," JD (U) leader Rajiv Ranjan said.
This comes a day after police arrested two persons involved in the murder of the Patna-based industrialist, including the man who had pulled the trigger.
"Both persons have been held in Patna by a joint team of Special Task Force and Patna Police.
The investigation is in progress. We will be able to divulge more details in due course," said the officer.
Gopal Khemka was shot dead outside his residence in Patna by a bike-borne assailant at 11.40 pm on Friday, seven years after miscreants had gunned down his son in Hajipur. The incident had taken place near the gate of Khemka's house in the Gandhi Maidan locality.
Following the incident, chief minister Nitish Kumar held a meeting to review the law and order situation in the state on Saturday during which he instructed officials to complete the investigation at the earliest, officials said.
This is a developing story

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
13 minutes ago
- The Hindu
Commercial Tax Dept. unearths inter-State GST racket by nabbing Rajasthan ‘fake bill trader' who facilitated bogus input tax credit claim of ₹39 crore
Karnataka Commercial Taxes Department officials have unearthed a multi-State GST racket and arrested a Rajasthan-based 'fake bill trader' who had allegedly facilitated the fictitious transfer of input tax credit (ITC) of ₹39 crore under Goods and Services Tax (GST) to various manufacturers through fake firms in Karnataka. According to sources in the Commercial Taxes Department, fake bill trader Kailash Bishnoi, a resident of Jalore district in Rajasthan, was taken into custody in Bengaluru on Tuesday by a team comprising officers from the department's South Zone and Vigilance Division in coordination with the Bengaluru East police team. 17 fake firms Department sources said Bishnoi had created 17 fake firms in Karnataka that have shown a total turnover of ₹208 crore, based on which nearly ₹39 crore of ITC was passed on to some manufacturers. Sources noted that ₹39 crore was a financial burden caused by Bishnoi on Karnataka alone. Bishnoi was involved in the creation of fake GST registrations and bank accounts by fabricating Aadhaar cards, using which tax invoices were issued to the tune of several hundred crores to facilitate the fictitious movement of goods in metal scrap and facilitating the claim of bogus ITC by recipients, the department sources said. Investigation into the case is learnt to have revealed that he has operated in Chhattisgarh, Madhya Pradesh, Rajasthan, Telangana, Andhra Pradesh, Tamil Nadu, and Karnataka, creating fake firms and issuing tax invoices in association with his team members. The total quantum of the fraud would be much higher if the losses caused to other States is taken into account, officials explained. The arrest of his associate Rohit alias Rohtash in December 2024 and gathering of several incriminating material and digital evidences pointing to their crime finally resulted in the department officials nailing Bishnoi. Many fake documents In September 2023, the accused, along with his accomplices, tried to open 10 bank accounts by providing fake names, Aadhaar cards and PAN cards in HDFC Bank's Murugeshpalya branch in Bengaluru. The bank's branch manager had noticed this and filed a complaint with the Jeevan Bima Nagar police. The investigation team of the Bengaluru East police and the Commercial Taxes Department visited Rajasthan twice to track Bishnoi in the last six months. But he remained elusive as he was on constant move, changing locations in multiple States and using 14 mobile phone numbers to evade being tracked, sources said. Finally, he was arrested on Tuesday by the warrant of the Special Court for Economic Offences, Bengaluru, and given custody for further inquiry. Officers of the Commercial Taxes Department are continuing their investigation and analysing his actions from various angles. Ninth such case Incidentally, this is the ninth such case being traced in the last 15 months by the Karnataka Commercial Taxes Department which is continuing its pursuit against such offences to ensure equitable taxation and safeguard the interests of both the State and its honest taxpayers.


India Today
21 minutes ago
- India Today
Beware: This traffic challan message can drain your bank account
The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends


Time of India
38 minutes ago
- Time of India
ICC issues arrest warrants for Taliban leaders over persecution of women and girls
Live Events (You can now subscribe to our (You can now subscribe to our Economic Times WhatsApp channel The International Criminal Court issued arrest warrants Tuesday for the Taliban's supreme leader and the head of Afghanistan's Supreme Court on charges of persecuting women and girls since seizing power nearly four years warrants also accuse the leaders of persecuting "other persons non-conforming with the Taliban's policy on gender, gender identity or expression; and on political grounds against persons perceived as 'allies of girls and women.'"The warrants were issued against Taliban supreme leader Hibatullah Akhunzada and the head of the Supreme Court, Abdul Hakim warrants came just hours after the United Nations adopted a resolution Monday over U.S. objections that called on the Taliban to reverse their worsening oppression of women and girls and eliminate all terrorist are the latest high profile suspects named in arrest warrants issued by the Hague-based court that also has sought the arrest of other leaders including Russian President Vladimir Putin and Israeli Prime Minister Benjamin returning to power in Afghanistan in 2021, the Taliban have imposed harsh measures, banning women from public places and girls from attending school beyond the sixth grade. Last week, Russia became the first country to formally recognize the Taliban's court said in a statement that the Taliban have "severely deprived, through decrees and edicts, girls and women of the rights to education, privacy and family life and the freedoms of movement, expression, thought, conscience and religion. In addition, other persons were targeted because certain expressions of sexuality and/or gender identity were regarded as inconsistent with the Taliban's policy on gender."The court's chief prosecutor, Karim Khan, sought the warrants in January, saying that they recognized that "Afghan women and girls as well as the LGBTQI+ community are facing an unprecedented, unconscionable and ongoing persecution by the Taliban."Global advocacy group Human Rights Watch welcomed the decision."Senior Taliban leaders are now wanted men for their alleged persecution of women, girls, and gender non-conforming people. The international community should fully back the ICC in its critical work in Afghanistan and globally, including through concerted efforts to enforce the court's warrants," Liz Evenson, the group's international justice director, said in a judges approved a request in 2022 from the prosecutor to reopen an investigation into Afghanistan. The probe was shelved after Kabul said it could handle the said he wanted to reopen the inquiry because under the Taliban, there was "no longer the prospect of genuine and effective domestic investigations" in predecessor, Fatou Bensouda, got approval in 2020 to start looking at offenses allegedly committed by Afghan government forces, the Taliban, American troops and U.S. foreign intelligence operatives dating back to 2002. When Khan reopened the probe, he said he would focus on crimes committed by the Taliban and the Afghan affiliate of the Islamic State group. He said he would "deprioritize" other aspects of the investigation, such as crimes committed by warrants for Taliban leaders were issued while Khan has stepped down temporarily pending the outcome of an investigation into allegations of sexual misconduct. Khan has categorically denied accusations that he tried for more than a year to coerce a female aide into a sexual relationship and groped her against her will.