Indian authorities uncover massive cyber fraud network targeting US citizens
India's Enforcement Directorate has raided nine locations across three states in connection with an international money laundering operation that allegedly defrauded American citizens of millions through sophisticated call centre scams. The searches, conducted on January 29, 2026, targeted residential premises linked to key operatives of a network that combined technical support impersonation with tax authority deception to extract cryptocurrency payments from victims.
The investigation, triggered by intelligence from the Federal Bureau of Investigation, has exposed how proceeds from cyber-enabled fraud were laundered through shell companies and converted into real estate assets, highlighting persistent vulnerabilities in cross-border financial oversight.
Background and Context
The Enforcement Directorate launched its probe following an First Information Report registered by the Central Bureau of Investigation under provisions of the Bharatiya Nyaya Sanhita (BNS), 2023. The case originated from information shared by US authorities concerning organised fraud networks operating from India that targeted American nationals through deceptive phone calls.
According to agency statements, the operation involved approximately 36 individuals working under the banner of "Digicamps – The Future of Digital," a call centre that served as a front for the fraudulent scheme. The investigation revealed a systematic approach to deception, with fraudsters posing as both technical support providers and government officials to maximise victim compliance.
Key Figures and Entities
Court documents identify Jony, Daksh Sethi, and Gaurav Verma as the primary supervisors overseeing the fraudulent operation. The scheme was executed by operatives including Jigar Ahmed, Yash Khurana, Inderjeet Singh Bhalli, and Nikhil Sharma, who maintained direct contact with victims in the United States.
Financial records reviewed by investigators trace the flow of illicit funds through several corporate entities, including Bliss Infra Properties LLP and Bliss Infra Ventures LLP. These shell companies allegedly served as conduits for laundering proceeds of crime and acquiring legitimate-appearing assets.
Legal and Financial Mechanisms
The fraud scheme employed a dual-deception strategy, initially contacting victims under the pretence of providing technical support services. Victims were convinced their systems or financial accounts had been compromised, after which the fraudsters escalated their approach by impersonating officials from the Internal Revenue Service.
Under threat of supposed legal action and penalties, victims were coerced into transferring funds to cryptocurrency accounts controlled by the accused. The money was then layered through multiple transactions to obscure its origin before being converted into traditional assets. The operation's financial trail demonstrates the continued challenges posed by cryptocurrency in traditional anti-money laundering frameworks under the Prevention of Money Laundering Act (PMLA), 2002.
International Implications and Policy Response
The case underscores the growing sophistication of transnational cyber fraud operations and the limitations of current regulatory frameworks in preventing the misuse of digital assets for criminal purposes. The successful cooperation between Indian and US authorities in this investigation demonstrates the importance of international information sharing in combating financial crime.
Enforcement agencies have repeatedly warned that cyber-enabled fraud and cryptocurrency-based money laundering represent significant threats to global financial systems. The seizure of ₹34 lakh in unaccounted cash and numerous digital devices during the searches is expected to provide crucial evidence for expanding the investigation to identify additional beneficiaries and trace further assets acquired through the scheme.
Sources
This report draws on official statements from India's Enforcement Directorate, provisions of the Prevention of Money Laundering Act 2002, the Bharatiya Nyaya Sanhita 2023, corporate records from India's Ministry of Corporate Affairs, and publicly available information from US law enforcement agencies including the Federal Bureau of Investigation and Internal Revenue Service.