logo
How Pak spy 'Sejal Kapoor' scored 98 Indian targets

How Pak spy 'Sejal Kapoor' scored 98 Indian targets

Time of India20-05-2025

The arrest of Hisar-based woman travel vlogger Jyoti Malhotra on charges of spying and passing sensitive information to Pakistan has brought to the fore Pakistani intelligence agency's strategy to snare Indians with love and lies. Malhotra is not the first Indian to fall into the
ISI honeytrap
. Before her many men and women have been lured into spying by the ISI.
How easy it is to use love and romance as a trap is evident from the case of ISI spy '
Sejal Kapoor
' who compromised 98 targets within a few years with just a fake social media identity, TOI had reported in 2019. 'Sejal Kapoor' was one of a whole beehive of Pakistani spies posing as young Indian women with alluring names to honeytrap Indian defence officials.
A Pakistani spy, operating from within Pakistan, used the name 'Sejal Kapoor' to create a Facebook account and managed to hack into the computer systems of more than 98 officials from various departments, including the Indian Army, Air Force, Navy, paramilitary forces and state police personnel in Rajasthan, MP, Punjab and UP between 2015 and 2018.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Sambikerep: Beautiful New Senior Apartments with Two Bedrooms
Senior Apartments | Search Ads
Search Now
Undo
How 'Sejal Kapoor' trapped her targets
Sejal's Facebook profile said she was an employee of Hays Aviation in the UK. She trapped her targets by showing her videos and pictures with the help of a software malware released from a third-party server hosted in a West Asian country. She was involved in the case related to the leak of classified data on the BrahMos missile in 2018. The UP anti-terrorism squad (ATS) and military intelligence (MI) came to know about her with the arrest of BrahMos senior systems missile projects engineer Nishant Agarwal who was one of her victims.
In 2019, TOI had accessed her chats and the details of a malware used by her. Malware is malicious software specifically designed to gain access to or damage a computer, usually without the knowledge of the owner.
Live Events
Sleuths in UP Police and MI unearthed more than five dozen chats of this female spy. "Well, install whisper n check your desktop icon, open it and send me the code, lets talk there," the Pakistani spy said in one of the chats. "Waiting dude? Installed? After installing u will see Whisper icon on ur desktop. Just send me the code, then we will good to go. just unzip it. n click install. it's a chat app dude In UK, we all use that," she said. "Nope, its restricted. Its getting restricted. Whenever am trying to install it," an Indian official, the target she was chatting with, replied.
Spy application used by Sejal worked on stealth mode and had "self-aware" detection techniques which made them extremely difficult to be recognised by anti-malware programmes installed in computers. "It's a malicious communication app. It uses a malware command. A hacker can use as many as 25 internet addresses to mask her identity," a top intelligence official, closely monitoring the probe, had told TOI in 2019.
"Instantly, after getting downloaded, the malware first prompts the user to key in a code. It's to ensure that the app is not a virus or malware. Immediately after that, it scans all latest attachments sent from the computer in emails or downloads. It then scans all files with photographs, databases of MS Word and MS Excel, by first verifying their encryption keys and then opening their passwords," the intelligence official said.
One of 'Sejal''s victims was a BrahMos engineer
An engineer of BrahMos Aerospace Pvt Ltd associated with its missile projects in Nagpur was arrested in 2018 in a joint operation by the UP ATS, its Maharashtra counterpart and Military Intelligence on charges of passing on classified information about the project to Pakistan's ISI.
The arrested official, Nishant Agarwal, was a senior systems engineer at BrahMos Aerospace's unit at Butibori, near Nagpur. In his mid-20s, Agarwal headed the Hydraulics-Pneumatics and Warhead Integration wing of BrahMos' production department. Agarwal was managing a team of 40 personnel, including systems engineers, technical supervisors and technicians. He was also supervising the new projects at BrahMos' sites in Nagpur and Pilani, UP ATS officials said, adding that he had won the government's 'Young Scientist Award' for 2017-18.
Pankaj Awasthi, a UP-ATS investigation officer, said in his deposition during Agrawal's trial that 'Sejal' introduced herself to Agrawal as a recruiter from Hays Aviation, and as a student from Manchester to another victim, a former IAF staffer. Agrawal was also Facebook friends with two other individuals, 'Neha Sharma' and 'Pooja Ranjan', whose accounts too were active from Pakistan, testified Awasthi. Agrawal had chatted with 'Sejal' on Linked-in too, where she showed interest in hiring him. Awasthi told the court that on Sejal's directions, Agrawal had clicked on links sent by her and installed three apps - Qwhisper, Chat to Hire and X-trust - on his personal laptop.
If ISI can access secret information by trapping Indian officials with fake Facebook accounts operating from within Pakistan, trapping prominent social media influencers like Jyoti Malhotra points at a bigger intelligence project.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

NIA files charges against Goldy Brar, 4 others over grenade attacks on 2 Gurugram clubs
NIA files charges against Goldy Brar, 4 others over grenade attacks on 2 Gurugram clubs

Hans India

time20 minutes ago

  • Hans India

NIA files charges against Goldy Brar, 4 others over grenade attacks on 2 Gurugram clubs

New Delhi: Canada-based terrorist Goldy Brar and four others were named in a chargesheet filed by the National Investigation Agency (NIA) in a Special Court over twin grenade attacks on clubs in Gurugram last year, an official said on Saturday. The NIA has charged Satinderjit Singh alias Goldy Brar, along with Sachin Taliyan, Ankit, Bhawish and US-based Randeep Singh alias Randeep Malik, under various Sections of the Bharatiya Nyaya Sanhita (BNS), Arms Act, Explosives Substance Act, and Unlawful Activities (Prevention) Act. Barring Brar and Malik, all others have been arrested in the case, the NIA said. Brar is wanted in India for more than three dozen cases, including the killing of singer Sidhu Moosewala. The anti-terror agency's investigations into the twin grenade attacks found that the accused were involved in the conspiracy to target Warehouse Club and Human Club in Sector-29, Gurugram with bombs. The bomb attacks on the clubs were part of the Babbar Khalsa International's (BKI) larger conspiracy to spread communal disharmony and disrupt peace in Haryana and neighbouring regions by unleashing violence. The attack, perpetrated by members and cadres of the proscribed BKI terror outfit, took place on December 10, 2024. The NIA investigations later revealed that the deep-rooted terror conspiracy was hatched by Goldy Brar and his associates. As per NIA investigations, the terror syndicate is actively involved in extorting money, raising terror funds, procuring explosives and arms and ammunition, and promoting terror among the common people to threaten the integrity, security (including economic security) and sovereignty of the country. In April, the NIA searched multiple locations, linked with Goldy Brar, across the northern states of Haryana and Uttar Pradesh. The teams conducted searches at the premises belonging to suspects and accused associated with Goldy Brar and US-based gangster Randeep Malik in the case RC- 01/2025/NIA/DLI. Several electronic and other incriminating materials were recovered during the searches conducted at eight locations in various districts of the two states. Soon after the grenade attack, gangster Rohit Godara had taken responsibility through a social media post. Subsequent investigations by the NIA had exposed Malik and Brar, who had earlier threatened and attempted to extort money from the club owners, to have masterminded the grenade attacks.

YouTuber Jasbir Singh's police remand extended by two days in spying case
YouTuber Jasbir Singh's police remand extended by two days in spying case

Hindustan Times

time23 minutes ago

  • Hindustan Times

YouTuber Jasbir Singh's police remand extended by two days in spying case

A Mohali court on Saturday extended for two days the police remand of Punjab-based YouTuber Jasbir Singh, who was arrested on espionage charges on June 4. Jasbir Singh was produced before the court after his three-day police remand ended on Saturday. Police sought a seven-day remand but the court granted them two days, his counsel said. Jasbir Singh was in touch with influencer Jyoti Malhotra, who is in custody on charges of spying for Pakistan, and after his arrest the police had said that it had unearthed a terror-backed espionage network linking him to Pakistani intelligence and army officials. The police had said that the YouTuber was allegedly spying for Pakistan's Inter-Services Intelligence (ISI). Jasbir Singh, alias Jaan Mahal, 41, a resident of Mahlan village in Rupnagar district, was running a YouTube channel JaanMahal Video with over 11 lakh subscribers, ostensibly posting travel and cooking vlogs. He was found to be associated with a Pakistani Intelligence Operative (PIO), was in contact with a Pakistan High Commission official who was recently expelled from New Delhi on charges of spying and had met Pakistan army officials during one of his three visits to the neighbouring country, police had earlier alleged. He was found to be associated with PIO Shakir, alias Jatt Randhawa, part of a terror-backed espionage network. The accused had also travelled to Pakistan in 2020, 2021 and 2024, and came into contact with ISI officers, who subsequently cultivated and recruited him to carry out espionage activities within India, the police had said. Hisar native Jyoti Malhotra, 33, who was running the YouTube channel, Travel with JO, was arrested last month. On May 13, India had expelled Ehsan-ur-Rahim alias Danish, who was posted at the Pakistan High Commission, for allegedly indulging in espionage. Malhotra was allegedly in touch with Danish since November 2023.

Punjab YouTuber's police remand extended by 2 days in espionage case
Punjab YouTuber's police remand extended by 2 days in espionage case

The Print

time24 minutes ago

  • The Print

Punjab YouTuber's police remand extended by 2 days in espionage case

Singh was allegedly in close touch with influencer Jyoti Malhotra, who is in custody on charges of spying for Pakistan, and after his arrest the police had claimed that it unearthed a 'terror-backed espionage network' linking him to Pakistani intelligence and army officials. Singh was produced before the court after his three-day police remand ended on Saturday. Police sought a seven-day remand of Singh but the court granted them two days, said his counsel. Chandigarh, Jun 7 (PTI) A Mohali court on Saturday extended for two days the police remand of Punjab-based YouTuber Jasbir Singh, who was arrested on espionage charges on June 4. The police had said that the YouTuber was allegedly spying for Pakistan's Inter-Services Intelligence (ISI). Jasbir Singh alias Jaan Mahal (41), a resident of village Mahlan in Rupnagar district, was running a YouTube channel 'JaanMahal Video' with over 11 lakh subscribers, ostensibly posting travel and cooking vlogs. Singh was found to be associated with a Pakistani Intelligence Operative (PIO), was in contact with a Pakistan High Commission official who was recently expelled from New Delhi on charges of spying and had met Pakistan Army officials during one of his three visits to the neighbouring country, police had earlier alleged. Singh was found to be associated with PIO Shakir alias Jutt Randhawa, part of a terror-backed espionage network. The accused had also travelled to Pakistan on three occasions including in 2020, 2021 and 2024, and came into direct contact with ISI officers, who subsequently cultivated and recruited him to carry out espionage activities within India, police had claimed. Hisar native Malhotra (33) who was running a YouTube channel 'Travel with JO' was arrested last month. On May 13, India had expelled Ehsan-ur-Rahim alias Danish, who was posted at the Pakistan High Commission, for allegedly indulging in espionage. Malhotra was allegedly in touch with Danish since November 2023. PTI CHS RT RT This report is auto-generated from PTI news service. ThePrint holds no responsibility for its content.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store