Massive Scam Uncovered: ED Arrests Key Figure in Delhi-NCR Call Center Fraud Targeting US Citizens
Enforcement Directorate Takes Action Against Call Center Scam
New Delhi: The Enforcement Directorate (ED) has apprehended Chandra Prakash Gupta in relation to a significant illegal call center operation based in the Delhi-NCR area, which specifically targeted individuals in the United States, officials reported on Wednesday.
Gupta was taken into custody on December 13 under the Prevention of Money Laundering Act (PMLA), 2002, following a thorough investigation into fraudulent tech support schemes that involved impersonating well-known technical service providers.
As per the ED, a Special PMLA Court in Gurugram has remanded the accused to custody until December 24. Gupta, identified as a principal suspect in the scheme, had been evading capture since July 2024 after raids by the Central Bureau of Investigation (CBI), which subsequently led to a non-bailable warrant being issued against him.
The ED's inquiry commenced based on a First Information Report (FIR) filed by the CBI’s IOD branch in Delhi, citing various sections of the Indian Penal Code and the Information Technology Act, 2000.
On December 19 and 20, searches at ten locations across Delhi-NCR resulted in the confiscation of jewelry valued at approximately Rs 1.75 crore, cash exceeding Rs 10 lakh, four luxury vehicles, eight high-end watches, digital devices, and numerous incriminating documents.
Additionally, investigators recovered over 220 bottles of premium liquor, significantly surpassing the legal residential limit, from several locations.
This situation has been reported to the State Excise Department, and separate FIRs have been filed. Meanwhile, other significant suspects, including Arjun Gulati, Abhinav Kalra, and Divyansh Goel, remain at large.
Authorities disclosed that the illegal call centers operated from Noida and Gurugram, where employees deceived US citizens through misleading pop-up alerts that resembled official Microsoft security notifications.
Victims were misled into calling numbers shown on their screens and were urged to install remote access software, granting fraudsters complete control over their devices. This allowed the extraction of sensitive personal and banking information.
The illicit proceeds were funneled through foreign bank accounts, converted into cryptocurrencies, and then layered back into India via shell companies.
The ED estimates that from November 2022 to April 2024, victims lost nearly USD 15 million, with assets worth over Rs 100 crore acquired from these illegal activities.
The investigation into this case is still ongoing.