logo
Four arrested in SIM box racket with links to Cambodia

Four arrested in SIM box racket with links to Cambodia

The Hindu4 days ago
Four individuals of a gang operating an illegal SIM box setup from a rented house in Jannaram mandal in Mancherial were arrested by the Telangana Cyber Security Bureau (TGCSB), in collaboration with the Department of Telecommunications (DoT) and the Ramagundam police. The operation led to the seizure of equipment used to facilitate cross-border scams routed through domestic mobile networks.
The investigation was triggered after the DoT, through its Chakshu portal, flagged suspicious activity linked to impersonation and fraudulent calls originating from the region. Technical inputs provided by the department identified a SIM box device connected to multiple International Mobile Equipment Identitys (IMEI), which allowed internet-based international calls to be disguised as local calls. With just one or two individuals operating them, fraudsters can manage and make a high volume of calls simultaneously, often used in scams involving impersonation, threats, or financial fraud, while evading detection.
The arrested individuals were identified as Yandrapu Kamesh, a 24-year-old unemployed polytechnic diploma holder from Parvathipuram, Andhra Pradesh; Bavu Bapaiah, a 43-year-old labourer from Laxmipur in Jagtial district; Bavu Madhukar, Bapaiah's 32-year-old younger brother; and Gotla Rajeshwer, a 40-year-old farmer from Kishtapur village. The group had been working under the remote direction of Polavalsula Sai Krishna, also known as Jack or Raju, who is currently absconding and was allegedly operating from Cambodia.
Investigations revealed that Bapaiah had travelled to Cambodia in mid-2024 and reconnected with Sai Krishna, whom he had initially met in Chandigarh while attempting to secure a visa. After returning to India in April 2025, Bapaiah was contacted by Krishna via WhatsApp and asked to arrange a rented house in Jannaram for setting up the SIM box operation. With assistance from his brother-in-law Rajeshwer, the location was secured, and soon after, telecom devices were shipped to Jagitial. Since Bapaiah was not at home, his brother Madhukar received the parcel and placed the equipment in the rented premises.
Subsequently, Krishna instructed the brothers to secure a high-speed Airtel broadband connection, which was arranged with the help of a local dealer. Kamesh, who had been approached via Telegram by Krishna and offered a monthly salary of ₹70,000, was brought to Jannaram to oversee the operation. He was responsible for installing the hardware, configuring the SIM panels, and inserting SIMs in batches to evade detection. Krishna also provided Kamesh with ₹3 lakh to purchase over 200 proofless SIM cards from a man named Simhadri in Parvathipuram, with financial transactions facilitated through another associate, Bonu Jayavardhan. The unverified SIMs were delivered in multiple consignments and used in the SIM box to route fraudulent calls.
The group managed to establish a decentralised yet technically coordinated setup capable of handling high call volumes. During the raid, officials seized five SIM box devices, over 230 SIM cards, a laptop, four mobile phones, a D-Link router, a modem, and an inverter, all configured for seamless telecom routing.
Efforts are now underway to trace Sai Krishna, Bonu Jayavardhan, who helped procure SIM cards; and Simhadri, who supplied the proofless SIMs. Investigators are also probing the role of telecom service providers and internet companies that may have issued SIM cards without proper verification.
Financial transactions linked to the operation are being scrutinised to trace the flow of money and identify any connections to larger call centre-based fraud networks.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Student's suicide bid over ‘fee harassment' sparks row at TransStadia University
Student's suicide bid over ‘fee harassment' sparks row at TransStadia University

Time of India

time39 minutes ago

  • Time of India

Student's suicide bid over ‘fee harassment' sparks row at TransStadia University

Ahmedabad: A major controversy has erupted at TransStadia University in the Kankaria area of the city after a BCA student allegedly attempted suicide following repeated pressure from the university to pay tuition fees—despite holding a freeship card due to his reserved category status. The student reportedly consumed phenyl on July 24 and remains hospitalised in critical condition. His family has alleged that he was harassed over fee payments, claiming the university demanded an additional Rs 40,000 even after they had already paid Rs 10,000. Weekly penalties of Rs 500 were also allegedly imposed for non-payment, further worsening his distress, according to sources. The National Students' Union of India (NSUI) staged a protest on campus, demanding immediate police action against university officials and urging the administration to cover all of the student's medical expenses. Doctors have stated that the student's ability to speak again remains uncertain. You Can Also Check: Ahmedabad AQI | Weather in Ahmedabad | Bank Holidays in Ahmedabad | Public Holidays in Ahmedabad Protesters alleged that the university continued to send WhatsApp reminders about the fees, disregarding the student's valid freeship status. Ten days have passed since the incident, but no FIR has been registered, leading to public outrage and accusations of administrative apathy. In response, the university dismissed the allegations as "baseless and malicious," stating that all communication regarding fees was shared via a common broadcast group and that no student was individually targeted.

Man cheated in work from home scam
Man cheated in work from home scam

Time of India

time39 minutes ago

  • Time of India

Man cheated in work from home scam

Udupi: A man was allegedly cheated in a work-from-home (WFH) scam. Arun, in a complaint, stated that the incident occurred after an unknown person contacted him through Telegram and offered him a work-from-home task job that involved rating hotels. The person claimed that it was completely free and did not require any investment. The complainant accepted the task offered by the accused and earned Rs 800 by completing the first two tasks. For the third task, the accused told Arun that if he paid Rs 3,000 and completed a hotel rating task, he would receive Rs 4,500 in return. Believing this, the complainant completed the third task. However, the accused then informed him that to receive the Rs 4,500, he would have to complete another task, which required a payment of Rs 10,500 in advance. Accordingly, the complainant transferred Rs 10,500 to the Google Pay ID given by the accused. Later, the accused demanded an additional Rs 29,800 to continue the process, which the complainant transferred to a Paytm account provided by the accused. The accused then claimed that the complainant's hotel rating account was frozen and that all the money earned so far was stuck in it. To unfreeze the account and release the funds, the complainant was told to pay Rs 42,632, which he did. When the accused asked for even more money, the complainant realised it was an online fraud. In total, the accused got Rs 82,932 transferred to various accounts. A case was registered at Udupi Town police station.

9 of solver gang arrested from Haldwani hotel over SSC exam cheating racket
9 of solver gang arrested from Haldwani hotel over SSC exam cheating racket

Time of India

time3 hours ago

  • Time of India

9 of solver gang arrested from Haldwani hotel over SSC exam cheating racket

Nainital: Nine men have been arrested from a hotel in Haldwani for allegedly attempting to manipulate the Staff Selection Commission (SSC) online examinations by using remote desktop software to solve questions for paying candidates, police said on Monday, adding that laptops, mobile phones, Wi-Fi dongles, and other electronic equipment were seized from them during Sunday night's raid. Tired of too many ads? go ad free now The accused were operating from a hotel in Talli Bamori, where they planned to link exam centre systems to a remote setup controlled by an IT expert in Delhi. The group used remote-access software to take control of candidate terminals during exams held from July 26 to Aug 1. Police said the gang collected admit cards through WhatsApp, assigned solvers to sit at exam centres, and remotely answered questions in real time. Each candidate was charged Rs 4 lakh. Senior superintendent of police (SSP) Prahlad Narayan Meena said, "They were caught before they could carry out the plan. Remote access software and digital gadgets used for cheating were recovered." An FIR has been registered at Haldwani police station under BNS sections 318(4), 319(2), and 3(5) and section 66D of the Information Technology Act. The seized digital equipment is being sent for forensic analysis. Two accused, Parvinder Singh and Sunil Kumar, confessed to devising the plan to repay personal debts. In Dec 2024, they leased the GyanKosh Digital Library in Manpur West, Haldwani, from a Dehradun-based owner to run the operation. Solvers based in Delhi were to access exam systems and transmit answers to candidates. Their original attempt failed after library employee Himanshu Bisht refused to allow unauthorised laptop installations, prompting the gang to shift to the hotel. Tired of too many ads? go ad free now The arrested are Ramakant Sharma alias Rahul from Bulandshahr, Abhishek Kumar and Shiv Singh from Hathras, Sunil Kumar and Parvinder Kumar from Baghpat, Vishal Giri from Meerut/Haridwar, Aftab Khan and Arun Kumar from Muzaffarnagar, and Jasveer Singh from Rohtak. Police said some posed as invigilators, others handled logistics, tech setup, and payments. The SSC has faced repeated scrutiny over cheating and paper leaks. In July 2025, protests erupted in Delhi demanding reforms and stricter oversight of digital exams.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store