Student, 25, from Surat arrested; cheated Malad-based businessman through a cyber fraud involving a fake traffic e-challan message
Representation Pic/Sayyed Sameer Abedi
The North Cyber police have arrested a 25-year-old from Surat, Gujarat, allegedly linked to a cyber fraud gang that duped a Malad-based businessman of over Rs 21 lakh by sending him a malicious APK (Android Package Kit) file designed to appear as a traffic e-challan message on WhatsApp. The accused, Hardik Ashokbhai Borda, is a BCom student who was running an online business selling weighing machines. Police said he played a key role in a multi-layered cyber fraud racket that targeted victims by posing as the Regional Transport Office (RTO).
How it all unfolded
According to police, the complainant, a 42-year-old businessman residing in Malad East, had travelled to Gujarat in November 2025 to attend a wedding in the family. On November 17, while he was busy with wedding engagements, the businessman received a WhatsApp message from an unknown number containing a file named “RTO Challan”. Believing it to be a genuine traffic e-challan, he clicked on the file to verify the details. Unknowingly, he downloaded an APK file, which gave cyber fraudsters remote access to his mobile phone and banking applications. Within minutes, R11,33,880 and R10,39,326 were siphoned off from his and his wife’s bank accounts, respectively.
Hardik Ashokbhai Borda, the arrested accused, into whose bank account some of the money had been transferred
The businessman realised something was wrong on December 1, when he visited the bank to update his passbook and noticed suspicious withdrawals. Bank officials alerted him to a possible cyber fraud, following which he immediately approached the North Cyber police and also lodged a complaint on the Cyber
Helpline 1930.
Money trail and arrest
Investigations revealed that a total of Rs 21.73 lakh was fraudulently withdrawn from the couple’s accounts through multiple rapid transactions on the same morning. Of this amount, around Rs 8.5 lakh was traced directly to Borda’s bank account. Police said Borda subsequently transferred the money further using a credit card, pushing the funds into the second layer of the fraud chain to evade detection.
Based on technical analysis, bank transaction trails, and digital evidence, the North Cyber Police tracked Borda to Surat and placed him
under arrest.
“Initial investigation shows this was a well-planned, layered cyber fraud. The arrested accused acted as a key link in the money-laundering chain,” a senior cyber police officer said. “We are now tracing the second and third layers of the racket and do not rule out more arrests.” The cyber police have urged people to remain alert and never download APK files or click on suspicious links, even if they appear to be from official sources like the RTO, banks, or courier services.
ExpertSpeak
Ankur Puranik, a cyber expert, told mid-day, “An APK is basically an application file used to install apps on Android phones. Normally, when you download an app from the Google Play Store, it undergoes security checks. But when someone sends you an APK on WhatsApp, Telegram, SMS, or email and asks you to install it, that app is not verified by Google. Such files can be dangerous as they carry malware. Once installed, they can quietly access your contacts, photos, messages, OTPs, microphone, camera, and even banking apps. Many times, the user himself gives permissions without realising it, and the app keeps running in the background.”
According to the police, the accused was part of a multi-layered racket. Representation Pic/iStock
How an APK file can empty your bank account
What happens when you install an unverified APK?
Step 1: Permission trap
The app asks for permissions like:
. SMS access
. Accessibility service
. Screen overlay
. Notification access
. Storage access
. Most users click “Allow All” without reading
Step 2: OTP & message theft
. SMS permission allows the app to read OTPs silently
. Hackers get your banking OTP before you even see it
. Notification access lets the app read bank alerts without opening SMS
Step 3: Full phone control
With accessibility permission, the app can:
. See everything on your screen
. Read what you type
. Auto-click buttons
. Open banking apps
. Change transaction limits
. Perform high-value transactions remotely
. Your phone starts working for the hacker
Step 4: PIN and password capture
. Screen overlay creates invisible layers
. When you type in a PIN or a password, it’s secretly recorded and data becomes visible to cyber criminals
Step 5: Remote control
. Advanced APKs connect to a command server
. Hackers control your phone in real time
. Victims realise only after the money is gone
Warning signs
. App asks for unnecessary permissions
. Phone slows down or heats up
. Unknown apps running in the background
. Sudden bank transactions
Safety tips
Right: Never install APK files from WhatsApp or SMS
Right: Download apps only from Google Play Store/Apple App Store
Right: Keep “Install from Unknown Sources” OFF
Right: Check app permissions regularly
Right: Uninstall apps asking for unnecessary access
Right: Keep phone software updated
Right: Use a trusted antivirus
Subscribe today by clicking the link and stay updated with the latest news!" Click here!



