Massive Fake Call Center Busted in Gurugram: 47 Arrested in Multi-State Cybercrime Crackdown

Police uncover ₹143 crore international scam targeting US, UK, and Indian citizens through tech-support fraud, phishing campaigns, and fake loan apps.

Dateline: Gurugram | 04 December 2025

Summary: In one of the largest cybercrime raids conducted this year, Gurugram Police—assisted by central agencies—busted a sprawling fake call-center operation in Udyog Vihar that defrauded thousands of victims across India and abroad. Officers seized 162 computers, 298 mobile phones, crypto wallets, forged identity documents, and scripts used to impersonate bank officials and global tech support teams.


A Crackdown That Shook Gurugram’s Corporate Belt

Udyog Vihar, known for its sleek office towers and multinational presence, witnessed a dramatic late-night operation as cybercrime units stormed a four-story commercial building suspected of hosting illegal call-center activities. The raid, conducted around 1:45 AM, resulted in the arrest of 47 individuals, including the call-center manager, telecallers, data handlers, and crypto-wallet operators.

The illegal unit had been under surveillance for nearly five weeks after investigators traced international complaints to VoIP numbers registered inside the building.

How the Scam Worked: Three Major Fraud Models

According to investigators, the network operated three coordinated fraud models designed to extract money from both Indian and foreign victims. Each “vertical” of the scam was run by separate teams following detailed scripts.

1. Tech-Support Impersonation

This model targeted primarily US citizens. Telecallers posed as representatives of global technology companies, informing victims that their computers had been compromised by malware. They persuaded the victims to install remote-access tools, enabling scammers to gain full control of their devices.

Victims were then coerced into paying fees ranging from $199 to $799 for “repairs” that were entirely fabricated.

2. Fake Loan Applications for Indian Users

Another wing of the operation targeted financially vulnerable Indians through fake loan apps. Victims downloaded apps promising instant loans of ₹5,000–₹50,000. After uploading their documents, they received no money—only blackmail threats.

Callers used threats of legal action, police cases, and morphed photos to extort payments. Police estimate that this vertical alone generated ₹38 crore in the past six months.

3. International “Refund Fraud” Campaign

The third model involved calling global victims claiming accidental overpayments for online purchases. Victims were tricked into entering manipulated banking portals where scammers created fake “extra payment” screens.

Victims panicked and transferred the “excess amount” back—money that went straight into cryptocurrency wallets controlled by the gang.

Inside the Raided Facility: A Hidden Cybercrime Assembly Line

Police described the operation as a highly organized digital factory. Officers found:

  • Rows of computer systems preloaded with auto-dialing software
  • VoIP masking tools that mimicked international area codes
  • Scripts printed as step-by-step conversational flows
  • Multiple small cabins used for crypto-wallet transactions
  • Fake bank portals designed to mislead victims

Officers also recovered 14 handwritten notebooks detailing daily “conversion targets” for each caller.

A ₹143 Crore Operation With Global Victims

Preliminary digital forensics show that the group handled transactions worth approximately ₹143 crore over the past year. The gang operated through:

  • 13 domestic mule accounts
  • 42 international crypto wallets
  • Hundreds of temporary VoIP lines
  • Encrypted messaging groups for coordination

Investigators traced complaints from victims in the United States, Canada, the UK, Australia, Germany, and India.

The Modus Operandi: A Deep Look Into Each Layer

The gang operated with a level of sophistication rarely seen in smaller cybercrime networks.

Recruitment of Callers

Young graduates from Delhi NCR, Uttar Pradesh, Bihar, and Rajasthan were hired with promises of salaries between ₹25,000 and ₹60,000 per month. Many believed they were joining legitimate customer-support roles.

Daily Workflow

Each caller was given:

  • A headset
  • A pre-written script
  • A target of 15–20 “successful extractions” per day
  • Access to VoIP lines and remote-access tools

Supervisors monitored calls and coached callers in real time using whisper-assisted software.

Data Sources

Police say the gang bought leaked global datasets from the dark web—containing millions of names, emails, and phone numbers. Leads were categorized into:

  • High-response zones
  • Repeat victims
  • Senior-citizen lists

These segments were aggressively targeted for maximum returns.

Crypto at the Heart of Money Movement

One of the biggest challenges for investigators was tracking the money trail. The gang used:

  • USDT and Bitcoin wallets
  • Crypto tumblers to hide transaction origin
  • Peer-to-peer exchanges
  • Offshore wallets operating through VPN

Cyber experts believe that professional crypto handlers were employed to move money rapidly before victims could report fraud.

Disturbing Use of AI Tools

Investigators also found evidence of AI-generated voice tools being used to mimic accents and deliver convincing scripts to US and UK victims.

The gang used text-to-speech tools trained on customer-care accents, making it nearly impossible for victims to detect fraud.

Police Reveal the Scale Through Digital Evidence

The cybercrime cell retrieved:

  • Over 54 TB of data from laptops and desktops
  • Thousands of call recordings
  • Screenshots of fake refund portals
  • Real-time dashboards showing daily earnings
  • Messaging histories coordinating operations

This evidence is being catalogued as part of the chargesheet.

The Masterminds: A Web Spanning Three States

Police believe the operation was controlled by three kingpins located across Delhi, Uttar Pradesh, and Nepal. The masterminds allegedly hired mid-level managers to run daily operations while maintaining distance from front-line activities.

International cooperation requests have been initiated to track cross-border links.

Victims Speak Out: A Trail of Trauma and Financial Loss

Several victims contacted police soon after hearing about the raid. A 68-year-old California resident reported losing $2,500 to a tech-support impersonation call. An Indian student in Pune was defrauded of ₹48,000 through a fake loan app.

Psychologists say cybercrime victims often suffer long-term anxiety and trust issues.

Gurugram’s Cybercrime Rise: A Pattern Emerges

The raid highlights a growing trend of illegal call centers operating from NCR. Gurugram’s proximity to Delhi, availability of office space, and young workforce make it a hotspot for both legitimate BPOs and illegal operations.

Over the past 18 months:

  • 22 illegal call centers have been busted
  • 270+ people arrested
  • ₹600+ crore linked to cyber fraud traced

Officials say criminals exploit the trust associated with corporate office locations.

Government Response and Policy Implications

The Union Government is now considering new amendments to the Information Technology Act to regulate:

  • VoIP masking services
  • Unlicensed call-center operations
  • Cross-border cybercrime
  • Crypto-related money laundering

Discussions are underway to create stricter licensing norms for call-center establishments.

What Happens Next: Charges, Custody, and Court Proceedings

The arrested individuals face charges under:

  • Sections of the IPC for cheating and forgery
  • IT Act provisions for digital fraud
  • MCOCA-like provisions for organized crime
  • PMLA for money laundering

Police are seeking extended custody to track financial trails and identify more victims.

A Wake-Up Call for Citizens

Authorities urge the public to:

  • Avoid downloading unknown apps
  • Never give remote access to strangers
  • Ignore calls requesting financial data
  • Double-check loan offers through official channels
  • Report suspected fraud immediately to helpline number 1930

Experts warn that cybercrime syndicates are growing more advanced, making awareness crucial.

Conclusion: A Major Victory, but the War Continues

While the Gurugram raid is one of the most significant crackdowns of the year, officials emphasize that cybercrime networks continue to evolve. The operation exposes the scale, sophistication, and profitability of digital fraud, reinforcing that coordinated law enforcement and public vigilance are essential.

As investigators dig deeper into seized digital records, more arrests and revelations are expected in the coming months. Until then, Gurugram remains at the center of India’s battle against tech-enabled crime.

You May Also Like

More From Author

+ There are no comments

Add yours