In a major development highlighting weaknesses in one of India’s most critical identity systems, Balaghat Police have arrested a software engineer accused of running a long-standing Aadhaar updation fraud. The suspect, 39-year-old Mohsin Khan, is believed to have operated an illegal biometric manipulation setup for over ten years, using cloned fingerprints, fabricated iris data, and unauthorized software to carry out Aadhaar updates.
Officials reported that Khan, a resident of Bharveli, allegedly exploited security gaps by using Virtual Private Network (VPN) tools to disguise his physical location, making it appear as though he was operating from a legitimate Aadhaar enrolment centre. The case surfaced after a formal complaint was filed at the Bharveli Police Station, prompting a police team to raid the location and arrest Khan.
During the raid, authorities confiscated several suspicious devices and tools, including:
Laptops loaded with biometric tampering software
Silicone-based fake fingerprints
Digital replicas of iris scans
High-precision fingerprint recording machines
Aadhaar update hardware not connected to any authorized centre
Investigators noted that several of the seized items are not easily available in the open market, indicating that the accused may have imported or custom-built them to breach UIDAI’s authentication safeguards.
Additional Superintendent of Police (ASP) Nihit Upadhyay confirmed that Khan allegedly created biometric duplicates of certified Aadhaar operators. These forged credentials were then used to access the Aadhaar portal under their identities.
"Preliminary investigation indicates that the accused replicated fingerprints and iris data of multiple authorized operators. He then used these biometric credentials to run Aadhaar updation activities without physical presence or departmental approval," the ASP said.
Police also revealed that Khan utilized artificial iris models engineered to mimic human eye patterns, allowing him to bypass UIDAI’s advanced iris-authentication mechanisms.
Early findings suggest that the illegal setup may have been active since 2011, making it one of the longest-running Aadhaar-related cybercrimes detected in the area. Khan allegedly submitted tenders using the identities of family members and acquaintances to obtain Aadhaar updation kits and operator credentials, all of which he kept under his control.
Authorities now suspect that thousands of Aadhaar profiles may have been altered, raising concerns over potential identity theft, financial fraud, and unauthorized access to government schemes or banking services.
Sources indicate that Khan may have benefited from bureaucratic contacts or administrative support, which might explain how he operated for so many years without detection. Investigators are analyzing whether the case is part of a larger organized data-fraud network.
The ongoing investigation includes examination of:
Digital payment and transaction records
Forensic data from seized devices
Aadhaar update logs
Client and network activity patterns
Khan is expected to be placed under police remand for additional interrogation.
The case has renewed discussions around the safety of India’s biometric-based identity infrastructure. Cybersecurity specialists caution that unauthorized biometric cloning poses a significant threat to national databases, banking systems, and citizen privacy.
Police have intensified the probe, and officials anticipate more arrests and disclosures in the coming days.
There was a sweeping move by the United States Department of the Treasury Office of Foreign Assets Control that underscored the growing global concern over transnational fraud networks. Earlier this week, the Office of Foreign Assets Control imposed sanctions on a vast network of scam operations in Southeast Asia.
India’s digital transformation has advanced rapidly over the past decade. With more than 86% of households now online, the Digital India initiative has helped connect citizens, businesses, and services like never before. However, this growing connectivity has also exposed millions to rising cybersecurity risks and financial fraud.
According to official government data, reported cybersecurity incidents have more than doubled, from 10.29 lakh in 2022 to 22.68 lakh in 2024. Experts say this rise not only reflects a more complex threat environment but also improved mechanisms for tracking and reporting attacks.
By February 2025, complaints worth ₹36.45 lakh in total had been filed on the National Cyber Crime Reporting Portal (NCRP), revealing the scale of digital financial fraud in the country.
The Changing Face of Cyber Frauds
Cybercriminals are constantly evolving their methods. Traditional scams like phishing and spoofing where fraudsters pretend to represent banks or companies are now being replaced by more advanced schemes. Some use artificial intelligence to generate convincing fake voices or videos, making deception harder to detect.
A major area of exploitation involves India’s popular Unified Payments Interface (UPI). Attackers have been using compromised mobile numbers to steal funds. In response, the Department of Telecommunications introduced the Financial Fraud Risk Indicator (FRI), which identifies phone numbers showing suspicious financial activity.
Another serious concern is the surge of illegal online betting and gaming applications. Investigations suggest these platforms have collectively generated over ₹400 crore through deceptive schemes. To address this, the government passed the Promotion and Regulation of Online Gaming Bill, 2025, which bans online money gaming while supporting legitimate e-sports and social gaming activities.
India’s legal and institutional framework for cybersecurity continues to expand. The Information Technology Act, 2000, remains the backbone of cyber law, supported by newer policies such as the Digital Personal Data Protection Act, 2023, which reinforces users’ privacy rights and lawful data handling. The Intermediary Guidelines and Digital Media Ethics Code, 2021, also make digital platforms more accountable for the content they host.
The Union Budget 2025–26 allocated ₹782 crore for national cybersecurity initiatives. The government has already blocked over 9.42 lakh SIM cards and 2.63 lakh IMEIs associated with fraudulent activity. Through the CyTrain portal, over one lakh police officers have received training in digital forensics and cybercrime investigation.
National Coordination and Citizen Awareness
Agencies like CERT-In and the Indian Cyber Crime Coordination Centre (I4C) are central to India’s cyber response system. CERT-In has conducted over 100 cyber drills involving more than 1,400 organizations to assess preparedness. I4C’s “Samanvaya” and “Sahyog” platforms enable coordination across states and assist in removing harmful online content.
The government’s helpline number 1930 and the cybercrime portal cybercrime.gov.in provide citizens with direct channels to report cyber incidents. Awareness campaigns through radio, newspapers, and social media further aim to educate the public on online safety.
A Shared Responsibility
India’s expanding digital frontier holds immense promise, but it also demands shared responsibility. With stronger laws, institutional coordination, and public vigilance, India can continue to drive its digital progress while keeping citizens safe from cyber threats.
Almost everyone has experienced an unexpected call or text from an unknown number. While some turn out to be harmless misdials, many are actually spam or phishing attempts aimed at stealing personal or financial information. In some cases, the scam is obvious—like a caller asking for banking or credit card details—but other times, it’s much harder to tell.
To combat this, tech giants like Apple and Google allow users to mark suspicious calls or texts as spam or junk. Once flagged, your mobile carrier, the device manufacturer, third-party databases, and sometimes even federal bodies like the FCC and FTC, are notified.
On the network side, reported numbers are added to a centralized spam database. That’s why some calls appear on your screen labeled “Spam Likely.” It means that enough users have flagged the number, prompting your carrier to take preventive action. Essentially, every report you make contributes to a safer network for all users.
Modern carriers also use AI and machine learning to detect and block spam activity. For example, Google’s AI-based scam detection system becomes smarter and more accurate the more users report suspicious calls and messages.
Third-party apps like Truecaller, RoboKiller, and Hiya also rely on user reports to strengthen their own spam-blocking databases. This collective effort creates a ripple effect—when users flag spam, these systems improve their ability to identify and prevent future scams.
Unfortunately, scammers are evolving too. One of their most common tricks is “neighbor spoofing,” where they disguise their number to look like a local one. This creates a false sense of trust (“It’s a call from my area, it must be legitimate”). Fraudsters may even impersonate government bodies or organizations like the IRS or local police to extract personal data.
If you’re uncertain about the legitimacy of a call or text, the safest move is to hang up and contact the organization directly using verified contact details. Chances are, they’ll confirm it was a scam attempt.
To stay protected, you can also use your phone’s in-built spam filters:
For iPhone users: Go to Settings > Messages > Message Filtering > Unknown & Spam > Filter Unknown Senders. To block a number, tap the info icon next to it and select Block Contact, or long-press a spam text and block it directly.
For Android users: Open Google Messages > Settings > Spam Protection > Enable Spam Protection. To block, open Phone > More > Call history, choose the number, and tap Block/Report Spam. You can also block a number directly from your text messages by long-pressing the conversation.
Additionally, you can report spam directly to your mobile carrier by forwarding the suspicious message to 7726 (SPAM). If you believe you’ve encountered fraudulent activity, you can file a report with both the FTC and FCC for further investigation.
By consistently reporting spam, users help improve detection tools, reduce fraud, and make communication networks safer for everyone.
Police forces in the United Kingdom are alerting the public to a surge in online fraud cases, warning that criminals are now exploiting artificial intelligence and deepfake technology to impersonate relatives, friends, and even public figures. The warning, issued by West Mercia Police, stresses upon how technology is being used to deceive people into sharing sensitive information or transferring money.
According to the force’s Economic Crime Unit, criminals are constantly developing new strategies to exploit internet users. With the rapid evolution of AI, scams are becoming more convincing and harder to detect. To help people stay informed, officers have shared a list of common fraud-related terms and explained how each method works.
One of the most alarming developments is the use of AI-generated deepfakes, realistic videos or voice clips that make it appear as if a known person is speaking. These are often used in romance scams, investment frauds, or emotional blackmail schemes to gain a victim’s trust before asking for money.
Another growing threat is keylogging, where fraudsters trick victims into downloading malicious software that secretly records every keystroke. This allows criminals to steal passwords, banking details, and other private information. The software is often installed through fake links or phishing emails that look legitimate.
Account takeover, or ATO, remains one of the most common types of identity theft. Once scammers access an individual’s online account, they can change login credentials, reset security settings, and impersonate the victim to access bank or credit card information.
Police also warned about SIM swapping, a method in which criminals gather personal details from social media or scam calls and use them to convince mobile providers to transfer a victim’s number to a new SIM card. This gives the fraudster control over the victim’s messages and verification codes, making it easier to access online accounts.
Other scams include courier fraud, where offenders pose as police officers or bank representatives and instruct victims to withdraw money or purchase expensive goods. A “courier” then collects the items directly from the victim’s home. In many cases, scammers even ask for bank cards and PIN numbers.
The force’s notice also included reminders about malware and ransomware, malicious programs that can steal or lock files. Criminals may also encourage victims to install legitimate-looking remote access tools such as AnyDesk, allowing them full control of a victim’s device.
Additionally, spoofing — the act of disguising phone numbers, email addresses, or website links to appear genuine, continues to deceive users. Fraudsters often combine spoofing with AI to make fake communication appear even more authentic.
Police advise the public to remain vigilant, verify any unusual requests, and avoid clicking on suspicious links. Anyone seeking more information or help can visit trusted resources such as Action Fraud or Get Safe Online, which provide updates on current scams and guidance on reporting cybercrime.
To counter threats like SpamGPT, cybersecurity experts recommend:
Enforcing DMARC, SPF, and DKIM to block spoofed emails.
Deploying AI-driven phishing detection tools.
Maintaining regular backups and malware removal protocols.
Implementing multi-factor authentication (MFA) across all accounts.
Providing ongoing phishing awareness training for employees.
Using network segmentation and least-privilege access controls.
Keeping software and security patches updated.
Testing and refining incident response plans for rapid recovery.
SpamGPT demonstrates how cybercriminals are harnessing AI to evolve their tactics. As defenses improve, attackers are adapting just as quickly—making vigilance and layered security strategies more critical than ever.