function downloadVideo() { const videoUrl = document.getElementById('videoUrl').value; // Implement logic to download the video (e.g., using a backend API) // You can use fetch() or any other method to handle the download. // Replace this placeholder with your actual download logic. console.log(`Downloading video from ${videoUrl}`); } Mumbai man duped of Rs 2.35 lakh through fake MGL .APK file; 3 held from train

Mumbai man duped of Rs 2.35 lakh through fake MGL .APK file; 3 held from train

Mumbai Cyber Police have busted a cyber fraud racket that created and circulated fake .APK (Android Package Kit) files in the name of Mahanagar Gas Limited to dupe citizens. Three accused were dramatically arrested from a moving train in Bihar following a multi-state chase and technical surveillance.

Modus operandi

The case surfaced after a 64-year-old Mumbai resident, Upendra Narayan Muskur, was cheated of R2.35 lakh. Fraudsters posed as MGL officials and sent a malicious file named “MGL GAS UNBLOCK FILE.apk” via WhatsApp, claiming it would restore his gas connection. Once installed, the app gave hackers full remote access to his phone, allowing them to steal his banking credentials. 

Tech trail

A deep dive by the cyber lab into the .APK file revealed the creator’s digital footprint. By analyzing raw data, investigators linked the scam to Mohammad Arif Astul Ansari, 28, from Jharkhand, uncovering a trail of International Mobile Equipment Identity (IMEI) records, IP logs, and mobile numbers. 

How to stay safe

The safest way to avoid fake .APKs is downloading apps from trusted platforms like the Google Play Store, APKMirror, or official developer websites. Avoid unknown sites or links sent through WhatsApp, SMS, or Telegram. Check the developer name carefully before downloading. Fake apps often have misspelled or unfamiliar developer names. Compare the version number, logo, and app details with the official app listing to spot inconsistencies.

Train arrest

The chase: After the suspects fled Jharkhand and West Bengal, police tracked them to a train entering Bihar.

The capture: On April 22, Mumbai Police officers, with help from the RPF, intercepted the train at Kishanganj and nabbed the accused.

The business: Speaking to mid-day, an officer said, “The group specifically designed these malicious files for cyber fraud and sell them to other fraudsters for nationwide use”

What next

The accused are being brought to Mumbai on transit remand. With five mobile phones seized containing various fraud-linked .APKs, investigators believe this bust will expose a much larger syndicate targeting utility users across India. 

Arrested accused

Mohammad Arif Astul Ansari, 28, mastermind
Bilal Mohammad Naushad Sheikh, 28
Mehboob Alam Mohammad Naushad Alam, 25



Post a Comment

0 Comments