In mid-December 2024, IPS officer Raghvendra Sharma, the ASP of Jamtara district in Jharkhand, embarked on an investigation into a case of cyber fraud that led him down an unexpected path. While delving into the details, he stumbled upon a name that caught his attention – “DK Boss”.
Recalling the moment when he first noticed the name in connection with another cybercrime case, ASP Sharma’s curiosity was piqued. Just a week prior, a suspect in a separate cybercrime case revealed during questioning that he was involved in the distribution of malicious Android package kits (APKs). These APKs were designed to install apps aimed at stealing valuable data from unsuspecting users.
Further inspection of the suspect’s phone and WhatsApp chats unveiled a connection to a shadowy figure known as DK Boss. The seller behind the alias provided these harmful APKs to the suspect, operating under a cloak of anonymity. It was discovered that the WhatsApp number associated with DK Boss was fraudulently obtained, adding layers of clandestine behavior to the unfolding mystery.
As ASP Sharma and his team dug deeper, they uncovered a startling revelation – DK Boss was a central figure in numerous cybercrime cases. This led to the launch of a comprehensive investigation spearheaded by Sharma and DSP Chandra Shekhar, under the watchful eye of SP Ehtesham Waquarib, with the singular mission of tracking down DK Boss.
After a laborious month-long operation, on January 25, the team uncovered a sophisticated and well-organized crime syndicate behind the elusive DK Boss. Not only were three individuals using the alias arrested, but three accomplices were also apprehended in the operation.
The investigation was laden with challenges, as perpetrators of cyber fraud using DK Boss’s apps were unwilling to disclose the true identity of the mastermind. Despite the reluctance of these criminals, one common theme emerged – DK Boss’s apps were highly regarded in the cybercrime sphere for their flawless execution and functionality.
The web of deceit spun by DK Boss extended to around 10-15 fake phone numbers, all peddling malicious apps through WhatsApp profiles under the DK Boss guise. A breakthrough came with the arrest of a key player, Akhtar, who exposed the real identities of the individuals operating as DK Boss – Aarif, Mahboob Alam, and Sk Belal.
Subsequent investigations led the authorities from Haryana to Kashmir before zeroing in on the suspects’ return to Jamtara. A meticulously planned operation in Kenduatanr village culminated in the arrest of the six individuals associated with the DK Boss operation.
The elaborate scheme orchestrated by the group involved the creation of malicious apps that mirrored legitimate banking and government applications. These deceptive apps granted the scammers remote access to victims’ phones, paving the way for nefarious activities without the need for OTPs.
The operation had evolved from small-scale cyber fraud to a sophisticated enterprise, with the arrested individuals leveraging technology and AI to fine-tune their fraudulent operation. The seized items, including mobile phones, SIM cards, ATM cards, cash, and electronic devices, painted a picture of the scale and complexity of the criminal network.
The extent of the damage caused by the DK Boss operation unfolded as police delved deeper, uncovering a vast network of victims and compromised data. With over 415 cybercrime complaints and an estimated defrauded amount exceeding Rs 11 crore, the impact of this operation reverberated across India.
Efforts are now focused on unraveling the full scope of the operation and bringing all involved parties to justice. The hunt for the remaining members of the network continues as law enforcement works tirelessly to safeguard citizens against the pernicious threat posed by cybercriminals like DK Boss.