A cyber-fraud network operating out of Belagavi, Karnataka, has been dismantled by local authorities after a raid exposed a scheme targeting senior citizens in the United States. The operation, which had been running since March 2025, relied on personal data sourced from the dark web, with scammers using sophisticated methods to impersonate U.S. federal officials and extract money from victims.
Authorities were alerted to the operation after receiving intelligence from the Karnataka Internal Security Division, combined with an anonymous tip. This led to raids on a premises in the Azam Nagar area of Belagavi, where a call center was being operated under the guise of a legitimate business. During the raids, police arrested 33 individuals, including suspects from Gujarat, West Bengal, Assam, Himachal Pradesh, Maharashtra, Jharkhand, and Nepal. Seized from the premises were 37 laptops and 37 mobile phones, which are now being analyzed for forensic evidence.
How the Gang Used Darknet Data
The fraudsters had direct access to sensitive personal data, obtained through illicit means on the dark web, allowing them to initiate targeted calls to potential victims. The victims—primarily senior citizens in the U.S. were told that a parcel had been sent to them. When they denied having ordered anything, the scammers would redirect them to a second phone number, where they impersonated officials from U.S. agencies such as the FTC.
Once the victim called the second number, they were falsely informed that their personal information had been compromised or misused. This tactic created a sense of urgency and fear, encouraging victims to provide sensitive banking and financial details. Using these psychological manipulation techniques, the scammers were able to extort large sums of money from their victims.
The Groups Operational Tactics
To evade detection, these fraudsters used Voice over Internet Protocol (VoIP) technology and VPNs to disguise their true location. This made the calls appear as though they were originating from within the United States. Operators made around 100 calls per day each, working from a set of pre-written scripts designed to create confusion and fear in the victims. This method of operation is very common amongst scammers in that region.
The operation was highly structured, with each call center operators making multiple attempts to defraud people, often managing to cheat between two and ten individuals per day. Financial records and communications suggest that each operator earned between $216 to $540 per month, in addition to performance-based bonuses tied to the success of their scams.
A Network with International Reach
Investigations have indicated that the Belagavi operation is likely part of a larger network with links to other cybercrime groups operating across India and potentially beyond. The arrested individuals hail from multiple states within India, and the gang’s use of dark web data suggests coordination with other international criminal organizations involved in data theft and fraud.
The full scope of the operation is still under investigation, with authorities examining the seized devices for further digital traces of illicit activity. While the immediate arrests have disrupted the network, officials suspect that additional members may be involved, and the investigation is ongoing.
Legal Action and Scope of Operations
A First Information Report has been filed under multiple sections of the Indian Penal Code and the Information Technology Act, covering offenses related to cyber fraud, extortion, and the use of fraudulent means to obtain money. Law enforcement has stated that while this specific operation has been shut down, they believe it may be linked to other similar scams targeting foreign nationals.


0 Comments