Beware! Fake ‘traffic challan’ link leads to ₹14 lakh cyber fraud in Ahmedabad

A 48-year-old Ahmedabadf resident has alleged that he was duped of over ₹14 lakh after downloading a malicious mobile application sent via WhatsApp under the pretext of paying a traffic challan.
Ramol resident Sadiq Hussain Malik stated that the incident occurred on the night of November 28, when he received a WhatsApp message from an unknown number containing an APK file titled 'Traffic Challan 500.apk'. The message urged him to open the file to check and pay a pending e-challan, claiming it was the last date for payment.
Believing it to be genuine, Malik clicked on the file. However, the application did not display any information. Police said that the APK file was malicious and allegedly enabled the accused to gain unauthorised access to the complainant’s mobile phone and WhatsApp account.
According to the complaint, the perpetrators subsequently created multiple WhatsApp groups on the victim’s phone using the logo of the traffic police and circulated similar fake APK files to his contacts without his knowledge, thereby potentially targeting more victims.
The complainant further alleged that the accused accessed his banking applications and carried out a series of fraudulent transactions. Initially, ₹5,700 was transferred between his own bank accounts, after which a total of ₹13.14 lakh was debited through multiple transactions towards payment of credit card bills of unknown persons. Additionally, ₹91,500 was transferred to a separate bank account via IMPS.
In total, the complainant reported a loss of ₹14.05 lakh.
Malik stated that he contacted his bank after receiving transaction alerts and was advised to approach the police. He also registered a complaint with the National Cybercrime Helpline (1930) before approaching the Cyber Crime Police Station in Ahmedabad.
Police officials said a case has been registered against unidentified persons under relevant sections pertaining to cheating, data theft and unauthorised access to computer systems. Investigators are examining digital evidence, including the APK file and transaction trail, to identify the perpetrators.

