India’s Enforcement Directorate (ED) has raised its investigation into a nationwide cyber-fraud operation after identifying a large money-laundering network that routed criminal proceeds through traditional banking channels and cryptocurrency platforms. The agency’s Hyderabad Zonal Office has attached ₹8.46 crore held across 92 bank accounts, including financial balances connected to CoinDCX and a selection of crypto […]India’s Enforcement Directorate (ED) has raised its investigation into a nationwide cyber-fraud operation after identifying a large money-laundering network that routed criminal proceeds through traditional banking channels and cryptocurrency platforms. The agency’s Hyderabad Zonal Office has attached ₹8.46 crore held across 92 bank accounts, including financial balances connected to CoinDCX and a selection of crypto […]

ED uncovers ₹285 crore fraud using fake apps, multilayered bank accounts, and crypto routes

India’s Enforcement Directorate (ED) has raised its investigation into a nationwide cyber-fraud operation after identifying a large money-laundering network that routed criminal proceeds through traditional banking channels and cryptocurrency platforms.

The agency’s Hyderabad Zonal Office has attached ₹8.46 crore held across 92 bank accounts, including financial balances connected to CoinDCX and a selection of crypto wallets. Officials report that the case is tied to a broader scheme involving fake mobile apps, fraudulent e-commerce platforms, and misleading investment programs that allegedly collected ₹285 crore from victims across multiple states.

Fraud network built around fake job and investment apps

The case was initiated after Kadapa Police filed several First Information Reports in pursuance of Section 420 of the Indian Penal Code and Section 66-C and 66-D of the Information Technology Act. As the ED continued with the investigation, investigators discovered that other areas had also complained of the same issue, indicating that a well-organized operation was behind a series of applications, including the NBC App, Power Bank App, HPZ Token, RCC App, and other task-based earning tools.

According to the findings, scammers turned to WhatsApp and Telegram channels, where they recruited people, promising them commissions within a short time. Their approach included directing users to links that pretended to be legitimate service sites, where participants were given the task of undertaking simulated purchasing and selling of goods on the fabricated e-commerce websites.

Users were directed to transfer money into digital wallets associated with the apps before engaging in any activity, typically by transferring using a UPI linked to bank accounts and virtual payment addresses created by shell entities.

Victims routed into larger deposit cycles before losing access

According to investigators, the attackers initially used bank accounts to deposit small amounts of money, thereby gaining the trust of the victims. This trend motivated more targets to deposit more. As soon as the deposits swelled, withdrawals started to fail. Victims were then informed by communications teams working through messaging apps that they would need extra fees or taxes. Even after making those payments, users were unable to withdraw any funds.

Following that, websites became inaccessible, in-app balances disappeared, customer support channels were removed, and user accounts were deactivated. Some victims were also encouraged to recruit new participants under the promise of higher referral commissions, which would enable the fraud network to expand further.

The ED’s money-trail analysis shows that ₹285 crore in fraud proceeds circulated through more than 30 primary-layer bank accounts, each operational for short periods ranging from one to fifteen days. These accounts transferred funds to more than 80 secondary accounts to prevent early detection or freezing by banks. 

According to the investigators, the fraud network actively utilized the Binance peer-to-peer marketplace to purchase USDT (Tether). These acquisitions were made using third-party payments based on illicit deposits. The ED observed that sellers on WazirX, Buyhatke, and CoinDCX had acquired USDT at low prices and sold it on Binance P2P at a high price, with payments pegged to the proceeds of the crime.

A part, ₹4.81 crore, was allegedly exchanged into USDT using CoinDCX on non-KYC compliant accounts and transfers without verification by third parties.

If you're reading this, you’re already ahead. Stay there with our newsletter.

Market Opportunity
Lorenzo Protocol Logo
Lorenzo Protocol Price(BANK)
$0,05116
$0,05116$0,05116
-3,90%
USD
Lorenzo Protocol (BANK) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

ArtGis Finance Partners with MetaXR to Expand its DeFi Offerings in the Metaverse

ArtGis Finance Partners with MetaXR to Expand its DeFi Offerings in the Metaverse

By using this collaboration, ArtGis utilizes MetaXR’s infrastructure to widen access to its assets and enable its customers to interact with the metaverse.
Share
Blockchainreporter2025/09/18 00:07
The Best Parental Control Apps for 2026: Top Picks for Screen Time, Web Filtering, and Location Safety

The Best Parental Control Apps for 2026: Top Picks for Screen Time, Web Filtering, and Location Safety

Choosing a parental control app isn’t just about blocking websites. The best tools help families set healthy boundaries without turning daily life into constant
Share
Techbullion2026/01/20 00:39
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41