
Navy staffer held for leaking Operation Sindoor details, other classified info to Pakistani handler
An Indian Navy staffer posted in naval headquarters in Delhi was arrested in Jaipur for allegedly leaking defence-related sensitive information to a Pakistani handler in exchange for money, a police official said on Thursday (June 26, 2025).
Vishal Yadav, an Upper Division Clerk (UDC) in the Directorate of Dockyard at the Navy building, allegedly also shared details on Operation Sindoor — strikes carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in response to the Pahalgam terror attack.
Inspector General of Police (CID-Security) Vishnu Kant Gupta said Yadav, originally from Rewari in Haryana, leaked the classified information to a female Pakistani handler posing as an Indian woman.
He was arrested on Wednesday in Jaipur and will be subjected to a joint probe by multiple agencies.
"Yadav confessed to receiving approximately ₹2 lakh in total for the information he passed on," Mr. Gupta said.
"This included ₹50,000 for leaking information related to Operation Sindoor," the IGP said, adding some of the payments were also made in cryptocurrency.
Intelligence sources revealed that Yadav was first approached on Facebook. The Pakistani handler sent a friend request under the fake identity "Priya Sharma".
The two started communicating regularly and eventually shifted to WhatsApp and later to Telegram, a platform known for its encryption-enabled messages.
Police said that Yadav initially received small payments of ₹5,000-₹6,000 for lower-grade information. However, the handler allegedly encouraged him to provide more valuable intelligence in exchange for higher compensation. That's when Yadav began sharing critical defence-related data.
"He was lured by money and ended up leaking sensitive information from the Navy headquarters," Mr. Gupta said.
"After monitoring his social media activity and confirming his links with a Pakistani handler, he was detained in Jaipur for joint interrogation involving multiple national agencies," the IGP said.
Yadav, originally from Punsika village in Haryana's Rewari district, is also reported to be addicted to online gaming, which authorities believe may have made him more vulnerable to such traps.
Police said the forensic examination of Yadav's mobile phone reportedly uncovered extensive evidence, including financial transactions, sensitive messages, and confidential defence data exchanged with the handler. The investigation is ongoing, and authorities are probing his cryptocurrency transactions and connections.
IG Gupta emphasised that Pakistani intelligence agencies are using increasingly sophisticated methods to extract strategic information. "We are keeping a constant watch on such activities, and this arrest is a result of sustained monitoring and timely action," he said.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


India Today
33 minutes ago
- India Today
Will pray for mission's success: Shubhanshu's father as Dragon capsule docks at ISS
0:57 Major Moiz Abbas, the Pakistani officer who claimed to have captured Indian Air Force pilot Abhinandan Varthaman in 2019, was killed in a Tehrik-i-Taliban Pakistan (TTP) ambush on June 24, 2025.


NDTV
33 minutes ago
- NDTV
Exclusive: How Navy HQ Clerk Recruited By Pak Spy 'Priya Sharma' Was Caught
Jaipur: It was a crypto currency trail that led intelligence agencies to upper division clerk Vikas Yadav in Nau Sena Bhavan, the naval wing of the Defence Ministry. Mr Yadav was addicted to online gaming, sources said. A Pakistani woman identified as 'Priya Sharma' - clearly a fake name - befriended him on Facebook three years ago after seeing his addiction, and persuaded him into spying for Pakistan. Thereafter, she became her handler. After that, he switched to communicating with her on WhatsApp and Telegram. So, how exactly did intelligence operatives find out Mr Yadav, the upper division clerk in the Nau Sena Bhavan, was a spy? The case goes back to another one linked to a spy, Ravi Prakash Meena, a Rajasthan resident who was arrested in 2022. Mr Meena was a Class 4 employee in the Defence Ministry's Sena Bhawan. Investigators found that Mr Meena received money through a cryptocurrency channel in return for providing sensitive information like maps to his Pakistani handler. When intelligence agencies put Mr Meena's cryptocurrency channel under surveillance, they were led to two more people. One of them was Mr Yadav, the clerk in the Nau Sena Bhawan. They found that Mr Yadav had been getting money from the same cryptocurrency channel as Mr Meena. Thereafter, intelligence operatives put Mr Yadav under surveillance for over two years before finally arresting him. A large sum of money was being transferred from this cryptocurrency channel to Mr Yadav, who in turn used the money to feed his online gaming addiction. The intelligence agencies have got four-day custody of Mr Yadav. His mobile phone has been sent to a forensics laboratory. The police suspect that Mr Yadav was scanning sensitive naval documents and sending them to his Pakistani handler, 'Priya Sharma'. The method used by the Pakistani handlers is clear. They looked for clerical staff in the Defence Ministry and either lured them with honeytrap or offered money to give sensitive information. Intelligence agencies also suspect Mr Yadav gave sensitive information during Operation Sindoor.


Time of India
40 minutes ago
- Time of India
ESIC Hospital in Sodala evacuated after bomb threat email
Edited 359 Jaipur: ESIC Hospital, located near Orbit Mall on Ajmer Road, was evacuated Wednesday after an email, claiming to be from terrorist Ajmal Kasab, threatened a bomb attack on its premises. The hospital administration alerted police, who responded along with the fire brigade, bomb squad, civil defence, and other emergency teams. A full-scale search was launched, but no explosives or suspicious items were found. The cyber cell began investigating the origin and contents of the email, which claimed that an IPS officer from Tamil Nadu issued fake passports to former LTTE members with the help of his wife's travel agency. The message said these individuals were recruited by Pakistan and were carrying mobile phones and chemical-triggered fuses. The email also alleged they were travelling in a vehicle and intended to cause mass casualties at the hospital. The sender warned that if they suspected the plan was compromised, they would either trigger the fuse or release nerve gas through an IED. The message urged the Anti-Terrorism Squad to take immediate action and to contact the officer mentioned. The email stressed that the threat was not a hoax and that the fake passports could be traced to locations linked to the Assistant Commissioner of Intelligence in Madurai. It called for swift yet careful verification and response. When the email was received, the hospital was bustling with patients and staff. The premises were evacuated, and security measures were put in place. Wednesday's incident is the latest in a series of bomb threats targeting Jaipur. The city received at least 65 hoax threat emails in 2025, most of which targeted schools, with additional threats aimed at stadiums, court complexes, metro stations, hotels, medical colleges, and the airport. On May 8, 12, and 13, threatening emails warned of bombings at Sawai Man Singh Stadium. The May 13 threat also included a demand for justice for a rape survivor. A 30-year-old woman, identified as Rene Joshilda, was arrested last week by Ahmedabad police for sending these emails. On May 9, Jaipur Metro was also targeted with a similar threat via email, referring to "Operation Sindoor." That search, too, ended without any explosive device being found.