United States thanks CBI for cracking major cyber scam targeting Americans

    U.S. thanked CBI for its sustained role in cracking transnational cyber fraud after agents dismantled illegal call centres targeting U.S. citizens

    U.S. acknowledges CBI support after major transnational cyber fraud takedown
    U.S. acknowledges CBI support after major transnational cyber fraud takedown

    Coordinated intelligence ops expose repeat offender managing live scam hubs

    The United States formally thanked the CBI for its “continued support” in dismantling transnational cybercrime syndicates that had targeted American citizens at scale.

    In a statement posted on X, the U.S. Embassy in India confirmed that the CBI had cracked down on an illegal call centre operation running a sophisticated scam network aimed at defrauding U.S. nationals. The embassy said: “Through coordinated intelligence and decisive action, our agencies worked together to dismantle international networks, prevent future scams, and keep our citizens safe.” It added: “Thank you for your continued support, @CBIHeadquarters.”

    The CBI earlier arrested Vikas Kumar Nimar, the alleged mastermind behind the illegal operations of a firm named VC Informetrix Pvt Ltd, from Lucknow, Uttar Pradesh. Officials said he had been evading authorities for over a year before his arrest last week.

    Acting on intelligence about Nimar’s presence at his residence in Lucknow, the CBI had conducted a raid that led to a fresh breakthrough — officers discovered that he was simultaneously running another illegal call centre from the same premises, continuing to con victims in the U.S.

    During the search operation, the agency recovered 52 laptops and seized 82 devices in total, including 52 laptops that contained incriminating digital records, chat logs, scam scripts, and fraud-enablement tools. Officials said 52 laptops in particular held critical forensic evidence that helped map the larger transnational scam network.

    Investigators confirmed that the call centre had used voice spoofing, real-time phishing dashboards, fake customer support scripts, and hawala-linked payment routing to monetise the fraud. The operation was also believed to have employed mule accounts and encrypted communication channels to shield its earnings and hierarchy.

    The seizure of 52 laptops was later described by investigators as one of the most decisive digital evidence hauls in a cybercrime crackdown involving an active overseas scam network targeting only U.S. citizens.

    The CBI said the second call centre bust had exposed the accused’s unbroken role as a repeat offender, despite months on the run, reinforcing intelligence that he had been more than an operator — but a node commander in a multi-country scam supply chain.

    For all the latest updates, download PGurus App.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here