Man held for creating app to gain mobile access, scam users

290

Printed on: Dec 13, 2025 04:26 am IST

As soon as put in, the app allegedly supplied full distant entry to the sufferer’s machine, permitting a number of unauthorised digital transactions, police stated.

New Delhi: Delhi Police have arrested a 26-year-old man from Jamtara in Jharkhand for allegedly creating and supplying a malicious “buyer assist” Android utility that enabled cybercriminals to take distant management of victims’ cellphones, they stated on Thursday.

The man was arrested from Jamtara in Jharkhand (Representative photo)
The person was arrested from Jamtara in Jharkhand (Consultant picture)

Deputy commissioner of police (central) Nidhin Valsan stated that the arrest got here after a Minto Highway resident reported on July 29 that he had been duped of 1.20 lakh. The caller, posing as an electrical energy division official, warned that his energy connection can be reduce and satisfied him to put in an utility (APK file) despatched over the telephone. As soon as put in, the app allegedly supplied full distant entry to the sufferer’s machine, permitting a number of unauthorised digital transactions, police stated.

Police stated {that a} case below Part 318(4) of the Bharatiya Nyaya Sanhita was registered and a crew started analysing the backend structure of the APK file. “Investigators discovered it to be a Totally Undetected (FUD) Buyer Assist APK, a device more and more utilized in scams linked to remote-access exploitation,” DCP stated.

Technical surveillance, IP log tracing and scrutiny of digital cash trails ultimately pointed to Umesh Kumar Rajak, a Deoghar-based tech operator who police stated customised and bought such APKs to cyber fraud networks for 15,000 every, police stated.

Rajak, who holds a BA in political science and in addition installs CCTV programs for work, was arrested on December 5 in a raid in Deoghar. “Three high-end Android telephones and digital proof, together with logs and chats detailing APK distribution, have been recovered,” Valsan stated.

Police stated Rajak recurrently up to date the malware to evade antivirus programs. He’s additionally named in two earlier dishonest instances – one in Mumbai reported in 2024 and one other with the Cyber CID in Ranchi.

Police stated that they’re now monitoring others who bought the APK and analysing seized knowledge to establish further victims and wider linkages to organised cyber-fraud modules.