In one of Karnataka’s largest-ever cyber fraud cases, a 57-year-old senior IT professional from Indiranagar was duped of an astonishing ₹31.83 crore over six months in a sophisticated ‘digital arrest’ scam. Police officials confirmed that this is the highest amount lost by a single victim in the state to this emerging form of cybercrime.
Fraud begins with fake courier call from ‘DHL’
The ordeal began on 15 September 2024, when the victim received a call from a person posing as an employee of DHL’s Mumbai office. She was falsely informed that a suspicious package in her name—allegedly containing three credit cards, four passports and prohibited MDMA drugs—had arrived at the courier centre in Andheri.
Confused, the woman explained she lived in Bengaluru and had no link to the parcel. The caller immediately suggested that her identity might have been misused and that the matter was a potential cybercrime. Without allowing her time to react, the call was transferred to a man impersonating a CBI officer.
Threats, intimidation and forced isolation
According to her police complaint, the fake CBI officer told her she was under investigation for a serious crime and warned her not to contact the Bengaluru police, a lawyer or even her own family. The fraudsters threatened to implicate her relatives if she disobeyed.
“It was a horrifying experience for me, going through their threats,” she reportedly told investigators.
With her son’s wedding approaching and fearing for her family’s safety, she complied with their instructions. She was placed under what the scammers called a ‘digital house arrest’—a constant Skype video surveillance where she was required to keep her camera on round the clock.
A man claiming to be CBI officer Pradeep Singh introduced another associate, Rahul Yadav, who allegedly “monitored” her movements for a week. During this time, she continued working from home, believing she was under government watch.
Scammers force victim to liquidate assets and transfer crores
On 23 September 2024, the fraudsters escalated the pressure. Singh questioned her via Skype from a hotel room and claimed her assets needed to be declared to the Financial Intelligence Unit (FIU) of the Reserve Bank of India.
Under intimidation, she broke her fixed deposits, withdrew insurance amounts and liquidated long-term savings. Over six months, she made 187 transfers amounting to ₹31.83 crore, believing that the money would be returned after verification by February 2025.
The criminals even fabricated a ‘clearance certificate’, which she received on 1 December 2024, just days before her son’s engagement. This document convinced her that the investigation was genuine.
Six months of psychological manipulation
Between September 2024 and March 2025, the victim endured persistent pressure. Different individuals contacted her, posing as senior officials, intelligence personnel or investigators. She was regularly harassed, insulted and psychologically manipulated.
Each time she enquired about her money, the scammers provided new excuses, claiming internal delays, ongoing verifications or procedural issues. On 26 March 2025, they abruptly stopped all communication, leaving her devastated and suspicious.
The realisation that she had fallen prey to a well-organised cybercrime syndicate only dawned on her when she finally confided in a trusted friend, who urged her to approach the police.
FIR registered; police begin tracing the money trail
Based on her detailed complaint, the East Cybercrime Police filed an FIR on 14 November 2025. Officials are now analysing the extensive transaction trail, the digital devices used by the victim, and the bank accounts where the funds were funnelled.
A senior officer involved in the probe stated that the case highlights the alarming rise of ‘digital arrest’ scams, where criminals impersonate government agencies such as CBI, NIA, RBI, ED, customs and cybercrime cells to extort money.
“These scams rely heavily on fear, isolation and psychological pressure,” the officer said, adding that such frauds often target well-educated professionals.
Conclusion: A wake-up call for citizens
The incident stands as a stark reminder of how cybercriminals are deploying advanced social engineering tactics to manipulate victims. Police have urged citizens to remain cautious, verify unknown callers, and immediately report any demand for money made in the name of government authorities.
Authorities emphasise that no law enforcement agency conducts financial verification through personal accounts, nor do they place citizens under digital house arrest.
As the investigation progresses, the case continues to spotlight the urgent need for stronger public awareness and cyber safety initiatives across Bengaluru.
