
Viceroy Research says Vedanta Semiconductors a ‘sham' commodities trading operation
According to Viceroy, 'We believe that Vedanta Limited (VEDL) subsidiary, Vedanta Semiconductors Private Limited (VSPL), is a sham commodities trading operation designed to improperly avoid classification as a Non-Banking Financial Company (NBFC)'.
In its report that came out on Friday (US time), the short-seller firm alleged that this scheme was devised to 'facilitate VEDL's remittance of brand fees to Vedanta Resource's (VRL) in April 2025, when it faced a severe liquidity crisis'.
'VSPL's operational illusion needs 24 months of regulatory silence to fulfil its purpose, repaying its offshore lenders and hiding the near-catastrophe of April 2024. While credit analysts are snoozing through the alarm bells, India's regulators are famously light sleepers,' the report claimed.
The US-based short seller has been publishing a series of reports on the Vedanta Group for the last few days, alleging that Vedanta Resources, the holding company of Vedanta, is propped by cash entirely from its operating unit.
Vedanta has denied all allegations so far, calling them 'baseless'.
In its latest report, Viceroy said that in April 2024, Vedanta Limited (VEDL) faced a severe liquidity crisis.
'In response, VEDL reactivated VSPL, not as a semiconductor venture, but as a zero-margin trading entity whose operations appear to consist entirely of paper-based commodity trading,' the report alleged.
'VSPL tapped offshore lenders for a short-term, INR-denominated, 10 per cent NCDs secured by VEDL's stake in HZL (equivalent to 1 per cent of outstanding shares) VSPL then began trading commodities (copper, silver, gold) on a zero-margin basis reminiscent of wash trading. It remitted the loan to VEDL as a 24-month 12 per cent loan, with the spread intended to cover the sham operation's costs,' Viceroy Research said in its report.
'VSPL, superficially an operating entity, would face reduced scrutiny for loan repayments under FEMA, Companies Act, PMLA and AML frameworks. VSPL will likely have to continue these sham operations until FY27, when the loans fall due and repayment will have to be routed back through it. If at any point the regulators intervene at VSPL, the lender group is likely facing a total wipeout,' it further alleged.
Earlier this week, Viceroy Research levelled fresh allegations against Vedanta Group, accusing the company's promoters of holding an undisclosed stake through a welfare trust to recycle funds. The company in question is PTC Cables Pvt. Ltd (PTCC), which holds a 1.91 per cent stake in Vedanta Ltd, that has a market cap of Rs 1.75 lakh crore.
PTCC is owned by Bhadram Janhit Shalika Trust (BJST), which Viceroy alleges is controlled by the Agarwal family, founders of the Vedanta Group. However, the Vedanta Group has dismissed the allegations as 'baseless.'

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Economic Times
26 minutes ago
- Economic Times
GNG Electronics IPO opens with robust 44% GMP. Should you subscribe?
GNG Electronics launched its IPO aiming to raise Rs 460 crore through fresh issue and offer for sale, showing strong financials and investor interest with a 44% GMP. The company will use the proceeds to repay debt and for general corporate purposes. Brokerages recommend subscribing, citing GNG's scale, growth, and strategic positioning in the refurbished electronics market. Tired of too many ads? Remove Ads Tired of too many ads? Remove Ads GNG Electronics kicked off its IPO today aiming to raise Rs 460 crore through a combination of fresh issue and offer for sale. Riding on strong financials and investor interest, the IPO is debuting with a notable grey market premium (GMP) of 44%, indicating a healthy issue comprises a fresh equity raise of Rs 400 crore and an offer for sale worth Rs 60.44 crore by existing shareholders. The IPO is priced in the range of Rs 225–237, translating to a P/E of 33.3x on FY25 of the issue, the company raised Rs 138 crore from anchor investors on July 22, allocating over 58 lakh Electronics is a prominent player in the refurbished ICT (Information and Communication Technology) device segment. The company operates under the brand 'Electronics Bazaar' and offers end-to-end lifecycle solutions — from sourcing to refurbishment, distribution, after-sale service, and buyback clients include major retail and OEM brands such as Vijay Sales, HP, and GNG has reported strong growth. Revenue rose 24% year-on-year to Rs 1,420 crore in FY25, while profit after tax jumped 32% to Rs 69 from the issue will be primarily used to repay outstanding borrowings of the company and its UAE-based subsidiary, Electronics Bazaar FZC, with Rs 320 crore allocated for this purpose. The balance will go toward general corporate purposes. Motilal Oswal is the sole book-running lead manager and Bigshare Services is the a sharp rise in digital adoption and demand for cost-effective computing devices, GNG Electronics is looking to scale up its operations and reinforce its leadership in the growing refurbished electronics market SBI Securities and Canara Bank Securities have both given it a "Subscribe" rating, citing scale, growth, and strategic positioning."GNG operates in a fragmented but fast-formalising market. With operations in 38 countries, refurbishing over 5.9 lakh devices in FY25, and a 46% revenue CAGR over FY23–FY25, the company is well-poised to benefit from affordability-driven demand and ESG tailwinds," the brokerages said.(Disclaimer: Recommendations, suggestions, views and opinions given by the experts are their own. These do not represent the views of the Economic Times)


Hindustan Times
26 minutes ago
- Hindustan Times
Maha approaches SC against acquittal of 12 in Mumbai blasts
A day after the Bombay High Court acquitted all 12 men convicted of planning and executing the July 11, 2006 serial bomb blasts on Mumbai's suburban rail network, including five on death row, the Maharashtra government on Tuesday rushed to the Supreme Court seeking a stay on the verdict and an urgent hearing of its appeal. Maha approaches SC against acquittal of 12 in Mumbai blasts Solicitor General Tushar Mehta, appearing for the state government, mentioned the matter before Chief Justice of India Bhushan R Gavai, requesting that the petition be heard without delay. The CJI agreed to list the case for a hearing on July 24, even as he remarked: 'But we have been reading that some of them have already been released from jail.' Responding to the observation, Mehta acknowledged the development but added: 'The state still wants the appeal to be heard expeditiously.' The special leave petition challenging the High Court judgment was filed earlier in the day. The state's legal challenge argues that the High Court erred in reversing the trial court's judgment and seeks a stay on the acquittal to prevent further release of the accused. The acquittals triggered political outrage, with Maharashtra chief minister Devendra Fadnavis on Monday calling the verdict 'shocking' and vowing to challenge it in the Supreme Court. The appeal comes in the wake of Monday's decision by the Bombay High Court, which overturned the 2015 convictions handed down by a special court under the Maharashtra Control of Organised Crime Act (MCOCA). The High Court held that the prosecution 'utterly failed to establish the offence beyond reasonable doubt,' describing the investigation as riddled with procedural lapses, unreliable evidence and grave violations of the accused's constitutional rights. The 2006 blasts were among the deadliest terror attacks in India's history, killing 188 people and injuring 829. Seven powerful improvised explosive devices, planted in pressure cookers, ripped through first-class compartments of Mumbai's crowded local trains within six minutes during evening rush hour. The carnage left behind mangled steel and shattered lives, and prompted a massive terror investigation led by the Maharashtra Anti-Terrorism Squad (ATS). Within four months, 13 men were arrested by the ATS, which claimed that the attacks were orchestrated by former members of the banned Students' Islamic Movement of India (SIMI) and aided by the Pakistan-based Lashkar-e-Taiba (LeT). The ATS further alleged that 12 Pakistani nationals had infiltrated India to provide explosives and training to the accused—claims that ultimately failed to stand judicial scrutiny. In 2015, the MCOCA court convicted 12 of the 13 accused, awarding the death penalty to five and life imprisonment to the others. One man, Abdul Wahid Shaikh, a schoolteacher who refused to confess, was acquitted by the trial court. One of the 13 accused died during the lengthy appeals process before the Bombay High Court. On Monday, the Bombay High Court bench of Justices Anil S Kilor and Shyam Chandak delivered a 400-page verdict that raised fundamental questions about the fairness of the investigation and trial. It described the prosecution's case as a 'deceptive closure' that undermined public trust while allowing the true culprits to remain at large. The high court pointed out that the prosecution's reliance on confessional statements, which formed the bedrock of the ATS's case, was deeply flawed. Most of these statements, recorded between October 4 and 25, 2006, bore tell-tale signs of being 'cut-copy-paste' reproductions and raised suspicions of being extracted under coercion. Several accused retracted their confessions during trial, alleging torture in custody -- a claim the court found credible in light of procedural violations. The high court also noted that the accused were not informed of their right to consult their lawyers before confessing, despite being represented by advocates on record. This, the court ruled, was a violation of their fundamental rights. Furthermore, it cast serious doubt on the credibility of eyewitnesses, including two taxi drivers and a few train passengers, who claimed to have seen the accused planting the bombs. Their testimonies, recorded more than 100 days after the incident and four years later during identification parades, were found to be unreliable. The test identification parades themselves were conducted by officials not authorised under law. Material evidence, such as recovered RDX, circuit boards, pressure cookers, soldering guns and maps, was also deemed inadmissible. The court found that the chain of custody was broken and that the items were not properly sealed before being sent for forensic testing, casting doubt on their origin and connection to the accused. Additionally, the high court raised questions about the applicability of MCOCA in the case and noted serious procedural lapses in invoking its provisions. Ends

The Hindu
26 minutes ago
- The Hindu
Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows
A security patch released by Microsoft earlier this month failed to fully fix a critical flaw in the U.S. tech company's SharePoint server software that had been identified at a hacking competition in May, opening the door to a sweeping global cyber espionage operation, according to a timeline of events reviewed by Reuters. A Microsoft spokesperson confirmed on Tuesday that its initial solution did not work. The spokesperson added that Microsoft had released further patches that fixed the issue. It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend and is expected to escalate as other hackers join the fray. Microsoft said in a blog post that two allegedly Chinese hacking groups, dubbed "Linen Typhoon" and "Violet Typhoon," were exploiting the vulnerabilities, along with another China-based hacking group. Microsoft and Alphabet's Google have said that China-linked hackers were likely behind the first wave of hacks. Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies carrying out hacking operations. In an emailed statement, the Chinese embassy in Washington said China opposes all forms of cyberattacks, and "smearing others without solid evidence." The vulnerability that facilitated the attack was first identified in May at a hacking competition in Berlin organised by cybersecurity firm Trend Micro, which offered cash bounties for the discovery of computer bugs in popular software. It offered a $100,000 prize for "zero-day" exploits, which are called that because they leverage previously undisclosed digital weaknesses that could be used against SharePoint, Microsoft's flagship document management and collaboration platform. A researcher working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam's military, identified a SharePoint bug at the event, dubbed it "ToolShell" and demonstrated a method of exploiting it. The researcher was awarded $100,000 for the discovery, according to a post on X by Trend Micro's "Zero Day Initiative." In a statement, Trend Micro said it was the responsibility of vendors participating in its competition to patch and disclose security flaws in "an effective and timely manner." "Patches will occasionally fail. This has happened with SharePoint in the past," the statement said. Microsoft said in a July 8 security update that it had identified the bug, listed it as a critical vulnerability, and released patches to fix it. About 10 days later, however, cybersecurity firms started to notice an influx of malicious online activity targeting the same software the bug sought to exploit: SharePoint servers. "Threat actors subsequently developed exploits that appear to bypass these patches," British cybersecurity firm Sophos said in a blog post on Monday. The pool of potential ToolShell targets remains vast. According to data from Shodan, a search engine that helps identify internet-linked equipment, over 8,000 servers online could theoretically have already been compromised by hackers. Those servers include major industrial firms, banks, auditors, healthcare companies, and several U.S. state-level and international government entities. The Shadowserver Foundation, which scans the internet for potential digital vulnerabilities, put the number at a little more than 9,000, while cautioning that the figure was a minimum. It said most of those affected were in the United States and Germany, and the victims included government organisations. Germany's federal office for information security, BSI, said on Tuesday it had found SharePoint servers within government networks that were vulnerable to the ToolShell attack but none had been compromised.