Connect with us
Wednesday,15-October-2025
Breaking News

Crime

ED unearths ₹4,000 crore gaming scam after searches at 25 locations across India; seizes incriminating documents

Published

on

The Enforcement Directorate on Wednesday conducted search and seizure operations countrywide at 25 locations for forex violations by online gaming apps and websites. The Directorate is probing illegal remittance of Rs 4000 crore sent in the guise of payments for the import of goods and services by foreign registered online gaming companies and websites operating in India.

Searches were conducted on premises linked to several hawala operators, including that of Ashish Kakkar, Neeraj Bedi, Arjun Ashwinbhai Adhikari, Abhijeet Khot and the persons/entities associated with them.

Searches have led to seizure of incriminating documents

Searches have resulted in the seizure of incriminating documents and electronic evidence and the disclosure of interesting modus adopted by them to evade investigative agencies.

The operations were conducted in Delhi (11), Gujarat (7), Maharashtra (4), Madhya Pradesh (2) and Andhra Pradesh (1) on outlets of online gaming companies registered in small island countries such as Curacao, Malta and Cyprus. “However, all of them are linked to Indian bank accounts opened in the name of proxy persons who have no links with online gaming activity,” the probe agency said.

ED also seized electronic devices establishing foreign outward remittances of thousands of crores collected from public through gaming websites using accounts of dummy firms opened in the name of proxy persons.

Probe identified 55 bank accs being used for layering, remitting income

The probe identified 55 bank accounts of firms being used for layering and remitting income generated from online gaming in the guise of remittances against import of goods and services.

ED officials claimed that the amount collected from the public through gaming websites was routed through multiple bank accounts and finally remitted out of India by declaring the purpose of remittances against the import of services and goods. “Remittances out of the income from racing, riding, etc. or any other hobby are not allowed under the provisions of FEMA, 1999,” said an ED official.

Company heads open accounts in name of their employees and sending remittances

According to the ED, hundreds of companies have been opened by key persons in the name of their employees for layering and sending remittances to the tune of Rs 4,000 crore in the guise of payments for the import of goods and services.

Several PAN and Aadhaar cards used for creating such firms and mobiles used for operating bank accounts were also seized.

The probe found key persons were using international virtual mobile numbers for instant messaging apps like WhatsApp, Telegram, Signal, etc. and using pseudo-names such as Pablo, John, Watson, etc. for masking their actual identity.

To escape probe agencies, culprits use remote access apps

“To escape from investigating agencies, they are using remote-based servers and laptops which are being used through remote access apps such Any desk, Team Viewer,” explained a probe official adding that seizures made include incriminating documents and electronic devices establishing foreign outward remittances of thousands of crores. These were collected from public through gaming websites using accounts of dummy firms opened in the name of proxy persons who are not linked with the gaming activities; Rs. 19.55 lakh in cash, US$2695 and 55 bank accounts have been frozen.

Crime

1977 Attempt-To-Murder Case: Colaba Police Arrest 71-Year-Old Fugitive After 48 Years

Published

on

Mumbai: The Colaba Police have arrested a 71-year-old man who had been absconding for 48 years in an attempt-to-murder case registered in 1977. The accused, identified as Chandrashekhar Madhukar Kalekar, was wanted in Crime case was registered in 1977 under Section 307 of the Indian Penal Code, in connection with an attack on a woman with a sharp weapon.

Chandrashekhar Kalekar, When he was almost 22-Year-old, accused of attempting to murder a woman by stabbing her with a knife. A case was registered at the Colaba Police Station, and the trial was scheduled before the Sessions Court, Mumbai. However, Kalekar failed to appear for the hearings and was subsequently declared a proclaimed offender by the court.

The accused had been on the run since 1977. His old residence, Haji Kasam Chawl, Lalbaug, had been demolished years ago, and he kept changing his whereabouts — moving across Santacruz, Goregaon, Mahim, Lalbaug, and Badlapur — making it difficult for the police to trace him.

Over the past six months, a special team from Colaba Police launched a renewed effort to track him down. Using data from the Election Commission portal, RTO records, and court databases, officers discovered that Kalekar had been living in Karanjani village, Dapoli, Ratnagiri district.

Acting under the guidance of senior officers, a police team visited Dapoli with the help of local police. On the night of October 13–14, Kalekar was found hiding in a house in Karanjani. Upon interrogation, he confessed to being involved in the 1977 crime case. He was subsequently brought to Mumbai and re-arrested in the same case.

The accused had an affair with the victim when he was 22 years old. However, Accused by suspicion that his lover was involved with another man, the accused carried out the attack on her in 1977.

The accused was medically examined and produced before the 10th Sessions Court, Mumbai, for further legal proceedings. This operation Led By Under the supervision of Deputy Commissioner of Police (Zone I), Mumbai Dr. Pravina Mundhe.

Continue Reading

Crime

Mumbai: ED Raids 13 Locations In Gujarat In ₹91-Crore Q-Fon App Ponzi Scam

Published

on

Mumbai: The Enforcement Directorate (ED), Mumbai Zone II, on Tuesday conducted search operations at 13 locations in Gujarat as part of a money laundering investigation linked to the alleged Q-Fon App digital investment scam.

According to ED officials, searches were carried out at 10 locations in Ahmedabad and three in Surat, along with a few premises in Mumbai. The raids were conducted under the provisions of the Prevention of Money Laundering Act (PMLA), 2002, against Q-Fon App Limited and its directors in connection with a large-scale financial scam involving public investments. The searches targeted premises linked to the company’s directors and related entities suspected of receiving investors’ money.

The search was ongoing at all the three locations until the report was published and no information about any arrests or seizures was shared.

The ED action follows an FIR registered by the Economic Offences Wing (EOW), Thane, on December 28, 2024. The FIR alleged that Q-Fon App Limited, along with associated entities and directors including Sudhir Kotadiya, floated a Ponzi-style digital investment scheme claiming to generate earnings from online advertisements.

Investigation revealed that the accused promised investors unusually high returns, ranging between 2% and 10.5% per month. They collected huge sums from the public through cash deposits and online transfers routed via accounts of linked individuals and entities. The funds were allegedly siphoned off, and the accused later absconded with the investors’ money.

The Q-Fon App scam, which came to light following multiple complaints from duped investors, is part of a growing trend of app-based ponzi operations exploiting digital platforms to defraud citizens.

Officials said the fraudulent network, operating out of Ahmedabad, lured hundreds of investors across Maharashtra. The EOW FIR alleged that the scheme was led by Jay Sukhbhai Sakhia, also known as Patel, along with associates Umang Thathadia, Anant Patel, Sanjaybhai Sarithi Thathadia, and Saddubhai Dushyantbhai Thathadia. They reportedly collected crores of rupees via cash deposits and online transfers routed through linked entities.

According to an investor’s statement, the scam’s origins trace back to May 2020, when the accused introduced the “Digital Investment App” during one of the meetings. “They claimed to be running a legitimate business from Ahmedabad, assuring investors of monthly profits in US dollars through a mobile app available on the Google Play Store,” the investor told investigators.

The accused allegedly convinced participants of the scheme’s authenticity by claiming to have “connections within the Thane and Mumbai police.” Several meetings were held in Thane, Mumbai, Panvel, and Ahmedabad to persuade investors to contribute to what was described as a “secure digital earning platform.”

Later, victims discovered that the operation was a ponzi scheme, and the accused disappeared after collecting crores of rupees. The Thane EOW arrested Parag Ashok Kumar Shah, a key accused in the case, in June. Sources said that Shah, a small businessman from Narayangaon near Pune, had conspired with other businessmen from Gujarat to execute the scam.

ED sources added that the Ahmedabad-based network, operating under the guise of a “digital investment platform,” is suspected to be part of a larger pan-India ponzi racket, which defrauded investors across multiple states before vanishing without a trace.

Continue Reading

Crime

Former CEO Vijay Agarwal, Associates Booked For ₹19.66 Crore Corporate Fraud In Mumbai

Published

on

Mumbai: In a major corporate fraud case, a complaint has been registered against former CEO Vijay Agarwal and his associates Yogesh Bhura and Akshay Anjalia for allegedly conspiring to cheat Nibble Technologies Pvt. Ltd., a Powai-based tech firm, of approximately ₹19.66 crore through forged contracts and intellectual property theft.

According to the complaint, the accused, between November 2021 and August 2024, allegedly colluded with four companies — IQ Capital Holdings PTE. LTD. (Singapore), Dextra Lab PTE. LTD. (Singapore), Dextralab Solutions Pvt. Ltd. (Mumbai), and Dextralabs Innovation Pvt. Ltd. (Mumbai) — to execute fake and fabricated Master Service Agreements (MSAs) dated November 23, 2023. The agreements were allegedly signed by Yogesh Bhura, the authorized signatory of IQ Capital Holdings, and Vijay Agarwal.

The complaint further states that the trio misused company data, computer systems, source codes, products, and intellectual property to transfer ownership and profits illegally to the aforementioned entities. This was allegedly done with the intent to deceive Nibble Technologies and derive unlawful financial gains.

As a result, Nibble Technologies claims to have suffered losses amounting to ₹12.05 crore in product value, ₹4.77 crore in services, and ₹2.84 crore in revenue, totaling ₹19.66 crore.

Police sources confirmed that the accused took undue advantage of their positions of trust within the company and executed a criminal conspiracy to misappropriate proprietary assets and customer contracts. The alleged fraudulent acts included forging official correspondence and manipulating client relationships for personal benefit.

A case has been registered against Vijay Agarwal, Yogesh Bhura, Akshay Anjalia, and the four linked companies under relevant sections of the BNS related to cheating, criminal breach of trust, and forgery at Sakinaka Police Station. This case has been transferred to Economic Offence Wing (EOW ). The investigation is underway to trace the money trail and recover the misappropriated intellectual property, Said EOW Official.

Continue Reading

Trending