
Operation Mahadev: Pahalgam attack mastermind among 3 terrorists killed
NEW DELHI: In a major breakthrough, the Army's elite para commandos gunned down three terrorists in an encounter on the outskirts of Srinagar in Jammu and Kashmir on Monday.
One of the terrorists is Sulieman alias Asif, who is believed to be the mastermind of the April 22 Pahalgam attack, news agency PTI reported citing officials.
The group was killed after the security forces launched a surprise action, codenamed 'Operation Mahadev.
'
The two others were identified as Jibran and Hamza Afghani. Jibran was allegedly involved in the Sonamarg Tunnel attack in October 20204.
One M4 carbine rifle, two AK rifles and other munitions were recovered from the site of the encounter.
Additional security reinforcements have also been rushed as intelligence inputs suggested the presence of another group of terrorists in the area.
The bodies of the slain terrorists were handed over to local police, which helped in the identification process, for legal formalities and final rites as per the standard operating procedure.
Inspector General of Police (Kashmir Zone) VK Birdi described Operation Mahadev as a 'long-drawn operation.'
Earlier, Srinagar-based Chinar Corps in a post on X said three terrorists were killed under the anti-terror operation.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Mint
a few seconds ago
- Mint
Lucknows mule account menace: How local youths are fuelling global cyber fraud network
Lucknow, Aug 10 (PTI) Ajay, a 24-year-old restaurant waiter from the winding lanes of Old Lucknow, thought he had stumbled upon an easy way to make money. A friend introduced him to a crypto trader who offered ₹ 20,000 if Ajay allowed the use of his bank account for a day's transaction. Tempted, he agreed. The next morning, lakhs of rupees flowed into his account before these were withdrawn under someone else's instructions, and handed over to strangers. Within weeks, police knocked on Ajay's door. The money, they told him, was part of an elaborate international cyber fraud routed through his account. Shaken, Ajay turned approver, helping investigators identify other account holders and middlemen in a growing nexus that links the narrow lanes of Chowk, Indira Nagar, and Vrindavan Yojna, Sushant Golf City to handlers operating out of Cambodia, Vietnam, Laos and Thailand. Police investigations by Crime Branch and Cyber Cell over the past three months reveal that dozens of mule accounts - bank accounts used to launder illicit funds - belong to young men and women from Lucknow. Many work in restaurants, small shops, or contractual jobs; others are college students. Lured by commissions ranging from ₹ 10,000 to ₹ 30,000, they knowingly lend their accounts to local facilitators, who route cyber fraud proceeds into cryptocurrency, mainly USDT (Tether), through unregulated peer-to-peer networks on the TRC-20 blockchain. * How the Network Operates According to police, the operations are coordinated on encrypted Telegram channels run by Chinese handlers or their proxies in the Chinese language. Local recruiters collect account details and documents - often avoiding proper KYC or using forged papers. On transaction days, mule account holders are escorted to banks to withdraw cash immediately after large NEFT, RTGS, or IMPS transfers. The cash is then handed to crypto brokers, who convert it into USDT using decentralized, non-KYC wallets. Crypto wallets like Binance were found preferred choices. The funds come from a range of cybercrimes in India: online investment frauds, fake job or task schemes, sextortion, and bogus trading platforms. Victims' payments are funnelled into mule accounts before disappearing into the blockchain - beyond the jurisdiction of any single country. In just the last two months, Lucknow police tracked ₹ 5 lakh to ₹ 5 crore being laundered through such accounts, with all funds eventually converted into USDT and sent abroad. The network avoids legal exchanges, taxation, and banking compliance, disguising its activity as "crypto trading". * Lucknow -- A Hub for Mule Accounts What alarms police is the concentration of mule accounts in Old Lucknow localities like Chowk, Indira Nagar, Madiyaon, Malihabad and Bakshi Ka Talab as well as recently-developed neighbourhoods like Sushant Golf City, Vrindavan Yojna and suburban Mohanlalganj, Gosainganj areas. The police also detained for questioning around 60 young men from different areas who were found as the actual holders of the accounts used as mules in cases of cyber fraud that involved crores of rupees. "These young people aren't hardened criminals, but their actions enable large-scale fraud," Additional Deputy Commissioner of Police (Lucknow South) Rallapalli Vasanth Kumar told PTI. Kumar, who has been involved in busting multiple such gangs in the capital, said, "Several youth have confessed regret, admitting they underestimated the legal risks." The phenomenon also ties into the darker side of the global cybercrime economy: cyber slavery rackets in Southeast Asia. Thousands of Indians are trafficked or lured abroad with fake job offers, then forced to work in scam factories targeting victims in India and elsewhere - feeding proceeds back into networks that rely on mule accounts at home. While Lucknow police have cracked multiple such cases and identified the pattern, officials admit the scale and sophistication make detection difficult. The combination of encrypted communication, decentralized crypto wallets, and disposable bank accounts leaves little paper trail. The Uttar Pradesh Police and the Indian Cyber Crime Coordination Centre (I4C), a dedicated unit of the Union Ministry of Home Affairs, have drawn up a joint action plan to strengthen the state's cybercrime response. At a high-level meeting chaired by DGP Rajeev Krishna on August 6, officials agreed to set up a dedicated Cyber Crime Centre, create a special unit for offences against women and children, identify fraud hotspots, and deploy trained tech-savvy personnel. Public awareness drives will also be expanded. During a video conference on August 8 with police chiefs of all 75 districts, the DGP directed that cyber cells be manned only by trained officers, NCRP portal usage be maximised, and CyTrain enrolment via I4C be completed within 15 days. As for Ajay, he now warns his friends never to "rent out" their accounts. "I thought it was just extra cash," he says. "Now I know it was crime - and I'm lucky I got a second chance."


India.com
31 minutes ago
- India.com
Gunfight erupts between security forces and terrorists in J&K's Kishtwar; Army deploys Rudra helicopters, drones
J&K encounter- PTI image Kishtwar: A gunfight started on Sunday between the joint security forces and the terrorists in Jammu and Kashmir's Kishtwar district. The Army has deployed Rudra helicopters, drones and para commandos to ensure that the hiding terrorists are unable to escape. Security forces have been carrying out aggressive operations against the terrorists in the hinterland, while the Army has been on maximum alert guarding the Line of Control (LoC) in J&;K. Nagrota headquartered WhiteKnight Corps of the Army said on X, 'Alert Indian Army troops while carrying out an intelligence based operation have established contact with terrorists in general area of Dul in Kishtwar in early hours of 10 Aug 2025. Gunfire exchanged. Operation under progress'. Meanwhile, the prolonged anti-terrorist operation in the Akhal Devsar forest area of Kashmir's Kulgam district entered its 10th day. So far, one local terrorist and two soldiers have been killed in this operation, while four soldiers sustained injuries and are being treated in the hospital. The elimination of three hardcore Pakistani terrorists responsible for the April 22 Pahalgam terror attack, in which 26 people were killed, is part of the aggressive operations being carried out by the joint forces. Three hardcore Pakistani terrorists, including Lashkar-e-Taiba (LeT) commander, Suleman Shah and his two associates, Abu Hamza and Jibran Bhai, responsible for the Pahalgam attack, were killed on July 28 in the higher reaches of Dachigam national park on the foot of Mahadev mountain peak in Harwan area of Srinagar. The Army code-named this operation as 'Operation Mahadev'. After the Pahalgam terror attack, the security forces are carrying out anti-terrorist operations against gun-wielding terrorists, their overground workers and sympathisers. Drug smugglers and drug peddlers are also on the radar of the security forces because it is believed that the funds generated by the hawala money racket and drug smuggling are finally used to sustain terrorism in the union territory. The coordinated and Intelligence-backed operations of the joint forces are aimed at dismantling the ecosystem of terrorism in J&;K rather than focusing on just the elimination of the gun-wielding terrorists.
&w=3840&q=100)

First Post
an hour ago
- First Post
J&K: Heavy exchange of fire in Kishtwar as Army traps 2-3 terrorists
Indian Army troops on Sunday clashed with terrorists in Jammu and Kashmir's Kishtwar district during an intelligence-based operation, with heavy firing underway and at least two to three militants believed to be trapped. read more Indian paramilitary soldiers stand guard as police and army soldiers launch an operation in Awantipora area, south of Srinagar, Jammu and Kashmir, on Wednesday, May 6, 2020. (Photo: Dar Yasin/AP) Indian Army troops clashed with terrorists in Jammu and Kashmir's Kishtwar district early Sunday during an intelligence-based operation, the Army's White Knight Corps said. Acting on specific inputs, soldiers tracked suspected militants in the Dul area and came under fire shortly after making contact. Security sources believe two to three Pakistani terrorists are trapped, with heavy gunfire ongoing. The area has been sealed off, and the operation continues, with no word yet on casualties. STORY CONTINUES BELOW THIS AD Kishtwar has seen a spike in counterterror operations in recent months as forces push deeper into remote, mountainous terrain to dismantle militant networks. The clash comes amid Operation Akhal in South Kashmir's Kulgam district, launched on August 1 after reports of terrorist movement in a forested belt. It has already claimed two militants' lives but also cost the Army two soldiers, Lance Naik Pritpal Singh and Sepoy Harminder Singh, and left 10 others injured. At least two to three militants remain cornered in dense forests, with elite PARA units, drones, and attack helicopters working to flush them out.