
₹1.07 crore cash, 103 phones and tables, 79 ATM cards seized by Lucknow Police in city's biggest cyber fraud bust
According to a report by The Hindustan Times citing officials, the breakthrough came during a joint raid by the Crime Team (DCP East) and Gudamba police in a residential flat in Lucknow's Jankipuram on Wednesday.
Cops arrested 16 people — 12 from Chhattisgarh and four from Gujarat — after the raid, allegedly linked to a massive cyber fraud.
According to commissioner of police, Lucknow, Amrendra K Sengar, the accused were running a pan-India online betting scam to defraud people of lakhs.
The arrested people were identified as — Pramod Sahu (25), Sajid Ansari (24), Khemendra Sahu (23), Sohail Ashraf Khan (28), Tikesh Kumar Yadav (23), Sachin Kumar Gupta (24), Rakesh Kumar (50), Rakesh Prahlad Patel (50), Govind Bhai Mangaldas Prajapati (50), Govind Bhai (31), Abhay Mishra (22), Ansh Sharma (21), Shankar Bag (22), Vinayak Chauhan (24), Mohan Singh (29), and Vijay Sahni (23).
'Forged Aadhaar cards, several SIM cards and communication logs have been recovered. The accused used rented identities, making it difficult to trace the money trail,' ACP Ghazipur Anindya Vikram Singh said.
Here is a list of items police recovered in the Lucknow betting app case ₹ 1.07 crore in cash
1.07 crore in cash 103 mobile devices like smartphones and tablets
79 ATM cards
22 bank passbooks
13 chequebooks
two note-counting machines
14 Aadhaar cards, some of which were reportedly forged
According to Lucknow Police, the accused used a fake betting platform named 'Lotus Gaming' to run the massive cyber scam, where they first targeted users on Telegram and asked them to join a private group. They then asked them to download the app that resembled legitimate betting portals.
The gang would run this app from the backend, showing frequent small wins and big losses.
Victims of the fraud were asked to pay token amounts, which were transferred into multiple accounts, many of which were opened using fake identities.
'These accounts mostly belonged to poor individuals who had handed over their banking credentials for money. The entire system was layered to evade detection,' DCP East Shashank Singh said.
The online betting scam allegedly ran via a structured two-layer network where front-end players interacted with victims and backend handlers managed transactions.
The gang used both real and fake identities and quickly moved across accounts, withdrawing cash from ATMs, in order to bypass detection.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


India.com
36 minutes ago
- India.com
Aadhaar Scam Alert: No OTP required to empty your bank account savings! These easy methods can save your money...Know how to access...
Aadhaar Scam Alert: No OTP required to empty your bank account savings! These easy methods can save your how to access... Internet scams and fraud have posed a significant danger to everyone. In many examples reported, scammers posing as police officers may video call you to lure you into providing your own personal details, and then empty your bank account. At other times, they have been able to find your Aadhaar details from the internet, making it easier for them to steal your money. Being vigilant and protecting your information should be a constant effort. What is the Aadhaar-linked AEPS scam and how does it work? Numerous people's bank accounts were emptied without any visible transactions. How can this occur? The people's Aadhaar biometric data fell into the wrong hands. How does someone's bank account get emptied with no visible activity? The reason is an Aadhaar-linked AEPS scam. With the Aadhaar Enabled Payment System, money can be withdrawn with just an Aadhaar number and a fingerprint, which is an easy way for criminals to steal money. The Aadhaar-linked AEPS scam is a type of scam that allows scammers to exploit the Aadhaar Enabled Payment System (AEPS), which allows individuals to steal money from people's bank accounts without the use of OTP, debit card, or PIN. What leads to Aadhaar-linked AEPS scam? Cyber cafes, print shops, hotels, and similar places are common places where Aadhaar numbers can be stolen. After acquiring the Aadhaar number, the scammers often trace the victim to learn about their bank details. The last piece in the AEPS fraud puzzle is a fingerprint pattern. This is where the scammers start to get clever. They try to accumulate fingerprint data from places such as land registry offices or other sites that require fingerprints for authentication purposes. Once they obtain this data, they recreate these fingerprints on artificial silicone thumbs. Then using these thumbs they can withdraw money from the victim's bank account utilizing the Aadhaar Enabled Payment System (AEPS) – no OTP or PIN required. It can be locked online, after which your Aadhaar biometrics, fingerprint, and iris will be locked, and no one will be able to withdraw money with your fingerprint without your consent. What steps can you take to lock your Aadhaar biometrics? How to Lock your biometrics: Go to the UIDAI website. Click on My Aadhaar. Click on Lock/Unlock Biometrics. Enter your Aadhaar Number and log in using the OTP. Click Enable biometric lock. Services Even After Locking: Even if you have enabled a biometric lock, you can still avail services like eKYC, LPG subsidy, and other Government services using OTP without inconvenience. Temporary Unlock If Required. When your bank or SIM requires biometric verification for KYC, you can temporarily unlock your biometrics for a specified time. Scammers often use fake fingerprints (e.g., silicone replicas) to steal funds, but this will not occur if your biometrics are locked.


Hans India
2 hours ago
- Hans India
State police launch ‘Op TRACE' to find missing girls
Vijayawada: In a focused effort to trace missing girls across Andhra Pradesh, director general of police Harish Kumar Gupta on Thursday launched 'Operation TRACE', a month-long special drive to be conducted from August 1 to 31. The campaign, coordinated by the women and child safety wing, aims to address growing concerns over abductions and disappearances of girls by uniting the police machinery in a targeted, statewide initiative. Unveiling the campaign poster at the DGP's office, Harish Kumar Gupta explained that Operation TRACE is built on a five-point strategy — Trace, Reconnect, Assist, Counsel, and Empower. Under the first component 'Trace', advanced tools like CCTNS, theMission Vatsalya Portal, facial recognition software, and Aadhaar-based age verification will be used to identify and track missing girls. Intensive surveillance will be undertakenat transport hubs, border checkposts, and shelters, especially in high-risk areas, with the deployment of women police officers. 'Reconnect' focuses on reuniting rescued girls with their families and providing them temporary accommodation under the care of Child Welfare Committees (CWCs). Under 'Assist', girls will receive immediate medical help, food, shelter, clothing, legal aid, and identity documentation. In cases involving trafficking or abuse, FIRs will be promptly registered. 'Counsel' will involve psychological support and mental health interventions in partnership with NGOs, while 'Empower' aims to ensure long-term rehabilitation by facilitating education, skill development, career guidance, and linking survivors to government welfare schemes. The DGP also released a detailed action plan for the operation. From August 1–2, task forces at district and sub-divisional levels will be formed to collect and consolidate data on missing children. From August 3–10, inspections will be carried out at government and NGO-run shelters, and FIRs will be reverified using technologies such as DNA testing and facial recognition. During August 11–30, special search operations will be held in railway stations, bus stands, temples, and red-light areas. A public engagement campaign titled 'FIND HER' will also be rolled out to encourage citizen participation. To report missing children, the public can use the 'Report Missing Children' feature in the Shakti App or reach out through the following helplines: 112 (Police), 1098 (Child Helpline), 181 (Women's Helpline), and the Shakti WhatsApp Helpline at 7993485111. DGP Harish Kumar Gupta directed all district police units to prioritise Operation TRACE and ensure its strict implementation through local police stations. Senior officials including ADGP (L&O) N. Madhusudhana Reddy, IGP APSP and In-charge of women and child safety wing B Rajakumari, and SP, women protection cell, N Sridevi Rao were present at the launch event.


Indian Express
5 hours ago
- Indian Express
Operation Mahadev: Recovered mobile phones, long-range communicationsets hold key to Pahalgam terrorists' Pakistan link
At least three mobile phones and two LoRa (long range) communication sets recovered from Pahalgam attackers killed in Operation Mahadev are learnt to have thrown up considerable data, including photos of two Pakistani NADRA (National Database and Registration Authority) cards, sources in the security establishment told The Indian Express. The phones are currently being examined by the National Technical Research Organisation (NTRO) for retrieval of data. It is also examining the LoRa communication sets for any stamps of Pakistan. Among other things recovered by the security forces after Operation Mahadev are a GoPro harness, a 28-watt solar charger, three mobile chargers, one Swiss Military power bank, needle and threads, medicines, a stove, dry ration and a lot of tea. This is in addition to the arms and ammunition recovered from their bodies apart from two Aadhaar cards in the name of two local residents of Ganderbal and Srinagar. Sources said it is normal for Pakistan terrorists infiltrating India to procure Aadhaar cards as it helps them move around without being detected at police checkposts. The Aadhaar cards are typically procured through over ground workers or may belong to them. It is through the mobile phones and LoRa sets, however, that the security agencies aim to pin Pakistan down. Sources said the phones have a few documents and photos apart from details of local contacts, which are likely to lead to further arrests and unravelling of the logistical support the terrorists may have got over the past couple of years in the Valley. The recovery from the phones include NADRA card details of the terrorists. NADRA cards are computerised national identity cards issued by the National Database and Registration Authority, a Pakistan government agency. It's the primary identity document for Pakistani citizens, both within the country and overseas. The LoRa sets are expected to throw up data that may help the security agencies trace the movement of the terrorists over the past few months apart from the location where the devices were manufactured or assembled. LoRa sets refer to long-range radio communication technology. These devices are increasingly being used by terrorists and cross-border infiltrators, especially in border areas, as they can facilitate secure communication over long distances without relying on cellular networks or the Internet. Unlike satellite phones, which are vulnerable to interception, LoRa sets do not need to connect to a satellite. Indian intelligence and security agencies have in recent years intercepted or recovered LoRa sets from terrorists and infiltrators in J&K. These devices have been linked to Pakistan-based handlers coordinating movements or attacks. They are sometimes used in custom-built encrypted radios or even embedded in seemingly innocuous hardware. The terrorists who killed over 50 Army personnel in Poonch-Rajouri sector over the past couple of years have also been found to be using LoRa sets. While their messages cannot be intercepted, there is technology to determine their approximate location when they are switched on. However, the approximation can be in the range of a radius of 3-5 km, making it hard to detect the exact location in a thickly forested area, said sources.