
Ahmedabad, A chilling cybercrime case has come to light in India, where a gang of six fraudsters allegedly siphoned off nearly ₹29 crore from multiple bank accounts across 15 states — all without requiring victims’ OTPs (One-Time Passwords).The case, which began with a modest complaint from a businessman in Ahmedabad, quickly snowballed into one of the largest cyber fraud revelations in recent memory.
The First Crack in the Web
The breakthrough came when a businessman from Ahmedabad’s Paldi area reported to police that ₹25,000 had vanished from his account without any authorization or OTP notification. Alarmed, he approached the cybercrime cell. Initially, it appeared like a routine fraud case, but investigators soon realized the theft was not an isolated event — it was part of a massive, coordinated cyber heist.
The Investigative Trail
Taking the complaint seriously, police launched a technical investigation. Tracing digital footprints, transaction patterns, and suspicious accounts, they uncovered a sophisticated fraud network spread across the country. To their shock, the probe revealed that the fraud was not limited to Gujarat but stretched into 15 different states.
The gang had managed to bypass standard OTP-based security protocols — the cornerstone of Indian banking security. Instead, they exploited loopholes in digital payment ecosystems, intercepted backend processes, and misused banking system integrations to withdraw money directly from unsuspecting account holders.
The Modus Operandi
The gang’s strategy was highly technical and dangerously effective. According to police officials:
Banking Loophole Exploitation – The criminals exploited a flaw in the banking system that allowed them to initiate transactions without requiring OTP validation.
SIM Card Manipulation – In some cases, fraudsters used illegally procured SIM cards registered with stolen identities to divert bank alerts and remain undetected.
Multi-State Account Network – Money was quickly transferred to multiple mule accounts spread across different states, making tracking extremely difficult.
Layered Transactions – Funds were routed through several banks before being withdrawn in cash or converted into cryptocurrency.
The gang reportedly targeted accounts in both public and private sector banks, making the fraud widespread and complex.
Scale of the Scam
Investigators estimate that over ₹29 crore was siphoned off, with transactions traced across 15 states, including Gujarat, Maharashtra, Rajasthan, Delhi, Uttar Pradesh, Karnataka, and Madhya Pradesh. More than two dozen banks were affected.
What makes this scam even more alarming is that victims often remained unaware of the fraud until after large sums had already disappeared. Since no OTP was triggered, many victims initially suspected internal banking glitches rather than cybercrime.

Arrests and Recovery
After weeks of surveillance, digital tracking, and coordination with other state police units, Ahmedabad cybercrime authorities arrested six members of the gang. The accused are believed to be the core operatives who managed the fraudulent transactions and handled the diverted funds.
During the raids, police recovered laptops, multiple mobile phones, dozens of SIM cards, fake IDs, and documents linking the accused to mule bank accounts. Authorities also froze several bank accounts containing lakhs of rupees.
Investigators are now working to trace the remaining funds, much of which has already been withdrawn or laundered through complex channels.
Banking Sector Under Scrutiny
The case has raised serious concerns about the safety of India’s digital banking infrastructure. OTP verification has long been considered the backbone of secure online transactions, but the gang’s ability to bypass it has exposed vulnerabilities in the system.
Cybersecurity experts warn that as banking becomes more digitized, criminals are developing more sophisticated tools to exploit weaknesses. “This is not a case of simple phishing or fake calls,” said one expert. “The gang had a deep technical understanding of how banking systems communicate. That makes this case a red flag for the entire financial sector.”
National Impact
Given the multi-state spread of the fraud, central agencies like the Reserve Bank of India (RBI) and the Indian Computer Emergency Response Team (CERT-In) have been alerted. Coordination between states has been ramped up, and banks have been directed to conduct internal audits of their digital payment systems.
Some banks have already begun upgrading their transaction verification processes to include additional security layers beyond OTP, such as biometric confirmation or app-based approvals.
The Road Ahead
While the arrest of six members marks a major breakthrough, police believe that more individuals may be involved — particularly those who helped launder the stolen money. Authorities are tracking leads that suggest the gang may have connections with international cybercrime groups operating through the darknet.
For ordinary citizens, the case is a grim reminder of how vulnerable digital financial systems can be. Experts advise customers to regularly monitor their bank accounts, enable SMS and email alerts, and immediately report suspicious activity to their banks and the cybercrime helpline 1930.
Conclusion
What started as a small case of missing ₹25,000 in Ahmedabad has turned into a national alarm bell, exposing how fragile even the most trusted banking safeguards can be. With ₹29 crore looted across 15 states, the incident underscores the urgent need for stronger cybersecurity measures in India’s financial ecosystem.
As investigators continue to unravel the deeper layers of this fraud, one truth remains clear: in the digital age, crime no longer needs a gun or a mask — just a line of malicious code and a loophole waiting to be exploited.