It all started on May 5 at 10 a.m., when Rajkumar (name changed), an Indiranagar resident and retired MNC executive, got a call from 8861447031. The caller claimed as a 'FedEx' logistics executive and supplied Rajkumar's Aadhaar and mobile numbers.
He said that a package shipped to Taiwan under Shankar's name contained five passports, a laptop, 3kg of clothing, and 150 grams of MDMA. He forwarded the phone to a "police officer" after claiming a case against him had been filed at Mumbai's Andheri East cyber police station.
A man claimed to be Rajesh Pradhan, DCP (Cybercrime), Andheri and informed Shankar that he was under digital arrest until the inquiry was completed. They warned to arrest him if he left his residence and instructed him to isolate himself in a room. Later, they made a video call to him, and Shankar noticed a police station in the backdrop and assumed he was speaking with actual cops.
Pradhan informed Rajkumar that this was a high-profile and sensitive matter involving VIPs. He was told not to mention their call with anybody and threatened with arrest if he did not obey their instructions.
The con artist added that they discovered a bank account opened in his name that was being used for money laundering. They allegedly examined the charges against him, which included money laundering, NDPS, and other criminal actions, before offering to assist him.
To protect the account, he was ordered to move the full balance in his bank accounts to Reserve Bank of India (RBI) accounts.
After promising to repay him after his transactions were verified, they convinced Shankar to send money to their accounts in several transactions.
After transferring Rs 3.8 crore, Rajkumar was promised that the return would be in his account within 30 minutes of verification and the connection was discontinued. Rajkumar only realized he had been duped after the crooks went mute.
According to Kuldeep Kumar Jain, DCP (East), Shankar submitted a report on May 13, and they were able to freeze Rs 9 lakh within two days.
A case has been filed under the Information Technology Act and IPC section 420 (cheating and dishonestly inducing delivery of property).
According to Jain, such claims should not be taken seriously. The police force has no idea of digital arrests or online (virtual) investigations. If you receive such calls, simply disconnect and report them to your nearest police station or the 1930 cyber helpline. If you lose any money, you should contact the police right away. Delays in filing complaints will have an impact on recovery rates.
The National Payments Corporation of India (NPCI) and RBI regulations advise not using Indian payment systems for banned or blacklisted website categories such as porn sites, gambling, Chinese laundering/loan apps, Forex trading sites, or other shadowy websites.
To escape this restriction, scammers use Mule accounts to receive money through Indian payment ways like bank accounts, credit cards, UPI, debit cards, and VPA.
A Mule account is a famous term in cybercrime that looks for any account used for moving money illegally received through illegal activities. These accounts mostly belong to those who, intentionally or unintentionally, have been tricked into playing the illegal money laundering act.
Not aware of being part of a bigger scam, these individuals or “money Mules” are tricked into letting unknown scammers use their accounts to hide the source of laundered money. Scammers make these payments look legit through sly schemes and baits, hiding the money’s shadowy inheritance before it goes to the final destination.
“We detect 18 to 20 thousand cases every single day for a National Bank. These mule accounts are usually owned by regular people who are either tricked into opening them or knowingly use them at the behest of some monetary payments. We advise people not to share their account details or give access to anyone. Fraudsters can use your credentials for such illegal activity” said Amit Relan, Co-founder and CEO of mFilterit.
Money Mules fall into two categories: willing participants and duped participants. The scammers approach the Mule account customer online via emails, social media, websites, etc. Customers are fooled into believing they will get money in their bank account through commissions or incentives. After that, the scammer transfers laundered money into the Mule account.
Scammers attack vulnerable and naive individuals, using lucrative job scams or fake online relationships to scam people. The victims are fooled through false promises of easy money for not-so-harmful activities like transferring goods or money. If an online job opening seems too good to be true or needs managing money or services, it is most likely a Mule recruitment scam.
“Fraudsters might pose as authentic organizations like banks or government agencies to deceive victims into divulging personal or financial details. Phishing emails frequently include hyperlinks or attachments that, once clicked or opened, can deploy malware or direct users to fake websites crafted to steal sensitive information” said Dhiren. V. Dhedia, Head- Enterprise Solutions, CrossFraud.
Be cautious, if someone else controls your bank account, you are risking your savings and facing possible criminal charges. You should stay updated and informed to not fall for the mule scam.
Sharing your personal banking details with people you don’t trust is a big no, even if they have a believable story or offer.
Klimenka is accused of working with Alexander Vinnik and other individuals from July 2011 to July 2017 to operate BTC-e, an unregulated digital currency exchange, and to participate in a money laundering scheme, according to unsealed indictments.
The US Justice Department has accused BTC-e of being a hub for money laundering and cybercrime. The company is said to have provided high anonymity trading services that drew in customers who were heavily involved in illicit activities.
The news statement states that the site allegedly enabled financial transactions resulting from a variety of illegal activities, including computer hacking, fraud, identity theft, and drug trafficking.
Authorities emphasize BTC-e's involvement in cybercrimes and point out that it operated on American servers reportedly in violation of mandatory anti-money laundering procedures and "know your customer" (KYC) guidelines.
Furthermore, according to the government agency, BTC-e violated federal regulations mandating strict anti-money laundering protocols by failing to register as a money services organization, despite its substantial operations within the United States.
The arrest of Klimenka in Latvia last December, according to the US Department of Justice, was a significant milestone in their "efforts to combat cryptocurrency-facilitated crimes."
After making his first court appearance in San Francisco, Klimenka is being kept in detention and could receive a hefty 25-year maximum term if found guilty. The accusations highlight the U.S. government's increased emphasis on crimes involving digital assets, with the National Cryptocurrency Enforcement Team (NCET) leading inquiries into cryptocurrency misuse.
The press release stressed that the joint actions of the FBI, Homeland Security Investigations, IRS Criminal Investigation, and U.S. Secret Service underscore "the federal commitment to dismantling networks that leverage digital currencies for illegal activities."
Despite the US government's claim, new research from the cryptocurrency analysis company Chainalysis suggests that just a tiny portion of blockchain transactions are utilized for illicit purposes.
$24 billion was received by "illicit addresses" in 2023, mostly from "sanctioned entities" according to US government records. This is a significant decrease from its 2022 value of approximately $40 billion, as shown in the following chart.