logo
Wife, daughter and their lovers kill Meerut farmer

Wife, daughter and their lovers kill Meerut farmer

Hindustan Times14 hours ago
A woman and her daughter conspired with their respective lovers to murder the former's husband (also the latter's father), a 45-year-old farmer, Subhash, who was found critically injured in his field on June 23 with a gunshot wound to his lower back and succumbed to his injuries the following morning. Wife, daughter and their lovers kill Meerut farmer
Police could not record his statement before the death of Subhash.
What initially seemed like an unsolved case of assault took a dramatic turn when the police, on July 6, arrested Subhash's wife Kavita, daughter Sonam, their respective lovers Gulzar and Vipin Singh, and a fifth accomplice, Ajgar alias Shubham Kumar.
Subhash lived in Jani Khurd's Bhupgarhi village with his wife Kavita and four children. His oldest, a married daughter ; his second daughter Sonam, a BA final-year student at Kanohar Lal PG College in Meerut; and two sons, one in Class 10 and the other in Class 11.
Sonam, police officials said, was in a secret relationship with Vipin, a milk vendor from Brahmpuri. She first met him near her college, and their relationship intensified through Telegram and other social media platforms. Meanwhile Kavita was in an extramarital relationship with Gulzar, a local farmer whose fields adjoined the family's.
Both relationships were hidden from other family members, according to the police. Things came to a head, they added, when Sonam discovered her mother's affair and used it to blackmail her, demanding that she be allowed to marry Vipin. Both mother and daughter saw Subhash, who only uses his first name, as a common obstacle – a controlling figure who wouldn't approve of either relationship -- and decided it was time for him to go.
They convinced their partners to eliminate Subhash. Vipin drafted his friend Ajgar , and together the five of them spent five days planning the murder, the police said.
On June 23, Subhash left home to water his fields. Kavita and Sonam immediately informed their lovers via WhatsApp call . Vipin handed a country-made pistol to Ajgar, and drove him in a bike to a canal near the fields. There, Ajgar shot Subhash from behind and the bullet struck his lower back. The duo then fled, and hid the weapon, police said.
After Subhash's death, Kavita mourned as a grieving widow, Sonam cried for her dead father, and Gulzar even visited their home to offer condolences. Behind this mask of mourning, the conspirators believed the case would eventually die down.
Meanwhile, they kept in constant touch via WhatsApp, Facebook, and Instagram calls – discussing developments in the investigation and sharing police updates. Police discovered chat logs that included messages like Vipin telling Sonam, 'The job is done. Don't worry now,' and Sonam replying, I did wrong to papa,' to which Vipin responded, 'Don't worry... I'm here.'
The police formed four teams to investigate the case. They scrutinized phone call records, tracked the location of key individuals, and conducted interviews with locals. Villagers hinted at Kavita's affair with Gulzar. The police also noticed frequent communication between Kavita, Sonam, Gulzar, and Vipin.
Location data placed Vipin and Aigar near the crime scene at the time of the murder. Under interrogation, they revealed the entire plot and named all involved.
SP Rural Rakesh Kumar Mishra confirmed the arrest of all five accused. 'These individuals carefully planned and executed the murder of Subhash. They believed he was standing in the way of their love lives and plotted to remove him. With the help of digital evidence and sustained questioning, we were able to uncover the truth.'
The weapon used in the murder has been recovered, and all five have been sent to jail, police said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Udupi resident loses over ₹5 lakh to online investment fraud,
Udupi resident loses over ₹5 lakh to online investment fraud,

The Hindu

time17 minutes ago

  • The Hindu

Udupi resident loses over ₹5 lakh to online investment fraud,

An Udupi resident allegedly lost ₹5.42 lakh to an online investment fraud a few days ago. In the compliant to Udupi Cyber Economic and Narcotic (CEN) crime police station, the victim said that on June 13, he was added to 'Chearles Schwab 20 gold foreign exchange trading group' on Telegram app. On being assured of good returns, he transferred a total of ₹5,42,500 to different accounts of the members of the group. When he asked members to return the invested amount, they requested that he send more money. Realising that he had been cheated, the victim filed a complaint, which was registered for offences under Sections 66(C) and 66(D) of the Information Technology Act and under Section 318(4) of the Bharatiya Nyaya Sanhita. ISKCON staff duped A fraudster allegedly duped an ISKCON staff of ₹26,000 by posing as a transporter who wanted to donate funds to ISKCON. In a complaint to Mangaluru's Surathkal police, the victim said a person called him on July 6 evening. The caller introduced himself as Rahul, owner of Balaji Transport in Yeyyadi in Mangaluru and expressed his desire to make a donation to ISKCON. He sent a message to the victim about the transfer of ₹1. He then sent another message transferring to the ISKCON account a sum of ₹ 30,000 and asked the victim to return ₹ 26,000 by stating that he had inadvertently sent a higher amount. Believing the caller's message, the victim returned ₹26,000. The caller then sent a message transferring ₹40,000 and asked the victim to return the amount. The victim could not return the amount to the caller. The victim then checked the ISKCON account and realised that no amount from the fraudster was credited to the ISKCON account. The victim filed a complaint, which was registered by the Surathkal police.

Beware: This traffic challan message can drain your bank account
Beware: This traffic challan message can drain your bank account

India Today

time22 minutes ago

  • India Today

Beware: This traffic challan message can drain your bank account

The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends

Chennai Cocaine Case: Conditional Bail Granted To Actors Srikanth And Krishna
Chennai Cocaine Case: Conditional Bail Granted To Actors Srikanth And Krishna

NDTV

timean hour ago

  • NDTV

Chennai Cocaine Case: Conditional Bail Granted To Actors Srikanth And Krishna

Chennai: Actors Srikanth and Krishna have been granted conditional bail by the Madras High Court in the Chennai cocaine case that has rocked the Tamil film industry. The two actors, arrested in connection with an alleged high-profile drug racket, have been ordered to report daily at the Nungambakkam Police Station as part of their bail conditions. The actors were arrested after police arrested Prasad, a former AIADMK functionary accused of supplying cocaine to actor Srikanth, and Kevin, who allegedly sold drugs to Krishna. A Ghana national named John and another individual, Pradeep, were also taken into custody. Police say Kevin was caught with cocaine, referred to as ganja, methamphetamine, and Rs 45,000 in cash. Krishna allegedly consumed and shared drugs with friends and was part of WhatsApp groups used to coordinate drug use. Srikanth is believed to have had direct links with a drug cartel, having both purchased and used narcotics supplied by Prasad. Both actors belong to prominent film families. Srikanth has acted in around 70 films, while Krishna is the son of a film producer and brother of filmmaker Vishnu Varadhan, and has starred in celebrated Tamil films including Anjali, Iruvar, and Thalapathy. Reports suggest that other actors may be under the police radar in connection with the case. Following the controversy, Kerala-based film producers have made anti-drug affidavits mandatory on film sets. Law enforcement authorities have issued a stern warning that withholding information about drug possession or usage will now be treated as a criminal offence.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store