The Telangana Cyber Security Bureau (TGCSB), Hyderabad, organized a coordinated
operation as part of its ongoing investigation into cybercrimes and to apprehend the
accused individuals involved. SHIKHA GOEL, IPS., Director, TGCSB, Hyderabad in official release revealed the following details.To operate in the regions where the suspects were believed
to be present, two dedicated teams were dispatched to Kerala and one team to
Bengaluru. By careful preparation, thorough information analysis and synchronized field
operations, the teams successfully apprehended six persons. Of these, three were
apprehended in Kerala and the other three in Bangalore, marking a significant
advancement in the investigation, which includes five account holders and one agent,
in the following Cr.No’s of CCPS (Hqrs), TGCSB :
• Cr.No.38/2024, U/s. 66D ITA Act-2008, Sec.127(3), 351(2), 307, 319(2), 318(4), 338, r/w
61(2) BNS – Victim incurred a loss of Rs. 5,66,51,100/-.
• Cr.No. 01/2026, U/s. 66-D IT Act 2000-2008 Sec 318(4), 319(2),338 BNS – Victim
incurred a loss of Rs. 7,12,80,000/-
• Cr.No. 02/2026, U/s. U/s 66-D IT Act 2000-2008 Sec 318(4), 319(2),338 BNS – Victim
incurred a loss of Rs. 3,40,96,958 /-
Of the six accused, three were arrested from Bangalore and the other three were
arrested from different places in Kerala.
Brief facts of the case:
Cr.No.38/2024:
The brief facts of the case are that on 09.12.2024, a complaint was received from
a senior citizen woman that she was cheated by a group of impersonating officials of TRAI,
CBI, RBI and other national agencies. On 13th November 2024, she received a call from
+87088464044, where the caller falsely claimed that her Aadhaar-linked phone number
was involved in criminal activities. The call was transferred to persons identifying
themselves as CBI officers, Saurav Sharma and Ajay Gupta, who instructed her and her
daughters to connect on Skype, remain under 24-hour surveillance and follow strict
directions, stating they were “digitally arrested.”
The fraudsters sent fake documents with CBI and RBI logos and claimed her bank
accounts required verification. Under continuous pressure, she transferred large sums
through RTGS between 14th November and 3th December 2024, including breaking fixed
deposits. Later, Ajay Gupta contacted her via WhatsApp (+91 8296135919) demanding
further transfers. On visiting the CBI office at Koti on 8th December 2024, she learned all
documents were fake. She suffered a loss of Rs. 5,66,51,100/-.
Details of the accused Arrested:
1. Renju Pathakku Reji Aged 30 Years, Occ: Business,
R/o: Pattak House, Kudamurutty, Post Athikkayam, Pathanamthitta, Kerala-689711.
seizure:
1. Mobile Phones-01
Modus Operandi (M.O.):
Accused Renju Pathakku Reji having suffered financial losses in his education business,
entered into a criminal conspiracy with his known friend to earn illegal monetary gain.
Lured by the promise of commission, Renju Pathakku Reji knowingly provided his
company’s current bank account and credentials to his friend for use as a mule account
to receive proceeds of cyber fraud. Subsequently his friend provided the details to the
main fraudsters who are alleged to be operating from other countries.
➢ Cr.No.01/2026:
Brief facts of the case:
The brief facts of the case are that on 02.01.2026, a complaint was received from
a senior citizen that he became a victim of digital arrest by Sunil Sharma. He mentioned
that on 27.10.2025 he received a WhatsApp call from someone claiming to be from Blue
Dart Customer Care, alleging that a parcel linked to him contained illegal items. He
reported that another caller, posing as a Bombay Police officer, accused him of
involvement in serious offences and instructed him to keep the matter confidential while
forcing him to share financial details.
He further stated that on 29.10.2025 he was pressured into transferring Rs.19.80 lakhs,
followed by additional payments over the next two months totalling Rs.7,12,80,000. He
added that a later demand for more money made him suspicious, prompting him to file
a complaint with the NCRP on 31.12.2025. He requested appropriate action and recovery
of his financial loss.
Details of the accused Arrested:
1. Arun Sreenivas, , aged 41 yrs, Occ: Business-Digital
Marketing, R / o. Kanjiramthottiyil House, Kaipuzha, Kottayam district, Kerala-686602
Mobile: 8138004675.
2. Sanal V Menon, aged 48 yrs, Occ:
Consultant – Banking & Finance, R/o. No 9, Summer Palace, Menonmatt Kuttikatt,
Palace Road, Chowara Village, Aluva Taluk, Ernakulam district, Kerala-683571;
Mob.No. 7034498000.
seizure:
1. Mobile Phones – 02
Modus Operandi (M.O.):
The accused, Sanal Menon got into touch with a person from Jaipur through social
media and got convinced to provide his bank current account for commission. Similarly
and Arun Sreenivas got into touch with a person from Manipur in Guwahati when he
visited Guwahati on business purpose. As he incurred losses in business, he agreed to
provide his bank account on the request of Manipuri person for the sake of commission.
In this way both the accused knowingly allowed their accounts to be used to transfer
money obtained from unsuspecting victims through cybercrimes.
➢ Cr.No.02/2026:
Brief facts of the case:
The brief facts of the case are that on 03.01.2026, a complaint was received from
a business person living in Begumpet that he was compelled to report a serious case of
online trading fraud allegedly committed by Nadir Verma and his associates, who had
posed as genuine traders connected to the ORBM trading platform. He explained that
Verma had first approached him through WhatsApp on 29.10.2025, introducing himself as
a professor researching stock markets and encouraging investments in QIBs and IPOs by
promising unusually high returns.
He further mentioned that on 04.11.2025, Verma and his assistant Aisha directed
him to register on the ORBM platform through the links they provided, assuring him that
the company would take care of all trading analysis and advising him to invest money for
quick profits. The complainant reported that he initially invested Rs.1,00,000 on 02.12.2025,
after which his account showed a small profit and he was then persuaded to invest a
much larger amount.
He stated that under continuous pressure, he ultimately invested Rs.3,40,96,958 over
22 days. When he attempted to withdraw his funds on 22.12.2025, he was asked to deposit
additional money, which raised doubts about the legitimacy of their demands. He added
that he filed a complaint with the National Cyber Crime Reporting Portal on 01.01.2026
and requested necessary action and recovery of his financial losses.
Details of the accused Arrested:
1. V. Jayaprakash, age: 43 Yrs, 0cc: Director (ZIP Cleaning Services
Pvt. Ltd. Bengaluru)/ Account Supplier, R/o Line No. 36 23rd main 3rd cross
T Block, Girinagar, PO. Banashankari 3rd stage Benguluru, Mobile: 7760465701,
9553157398, 9880517337.
2. Balaraju, age 51 years, occ Director (ZIP CLEANING SERVICES PVT LTD
Bengaluru)/ Account Supplier, R/o Line No. 249 2nd main, 4th cross Sanjaynagar PO
RMV Extension2nd stage, behind Venkateshwara swamy temple Bengaluru North,
Karnataka. Mobile: 7795278579, 7675086562, 7204906729.
3. Harish G, Age: 55, Occupation: Business (Rice), R/o 45, 1st Floor, 2nd
Main, 4th Cross, APC LYT, Thindlu, DVidhyaranyapura, PO, Bangalore-560097,
Mobile: 9133790917, 7019147519.
seizure:
1. Mobile Phones – 03
Modus Operandi (M.O.):
Accused V JayaPraKash and Balaraju, being Directors of ZIP Cleaning Services Pvt.
Ltd. and account suppliers, conspired with Harish to commit the offence with an intention
to unlawfully gain financial benefits by misuse of company accounts, banking instruments
and electronic devices. In furtherance of their common intention, they collectively
participated in planning, execution and handling of proceedings of the offence. They
provided the account details to a person living in Pune and facilitated the transactions
by providing the account linked mobile phone to the main fraudsters. Efforts are being
continued to trace and apprehend the absconding accused.
Appeal to the Public:
The Telangana Cyber Security Bureau (TGCSB) urges the public to stay vigilant and
report anyone asking to use their bank accounts for transferring money under the guise of
avoiding tax issues, as such requests may be linked to fraud or illegal activities.
The cases were cracked by teams led by Inspectors D. Srinu, D. Ashish Reddy, and
E. Sreenu Naik respectively, along with other staff, under the supervision of Dy. S.P, KVM.
Prasad.
