They used to focus on feminine subscribers of cell banking and monetary companies.
Utilizing cloned Sim playing cards and figuring out themselves as cell banking officers, they used to swindle unassuming victims into traps utilizing faux dial codes and doctored hyperlinks to gather personal safety codes. Following this, they might siphon cash off their accounts.
Speedy Motion Battalion (Rab-3) yesterday claimed to have realized about these revolutionary methods of a fraud gang after arresting its ringleader from the capital’s Mirpur late on Thursday night time.
A group of Rab-Three arrested Md Sohel Ahmed (36) from a first-floor flat of a five-storeyed home in Mirpur-1, mentioned Lt Col Rakibul Hasan, director of Rab-3.
The elite power additionally recovered a laptop computer, one multi-SIM gateway machine, a sign buster, three modems and an enormous variety of Sim playing cards and gear from his possession.
Addressing a briefing at Rab-Three headquarters within the capital’s Tikatuli, Lt Col Rakibul mentioned Sohel and his gang members used to gather cellphone numbers of cell banking customers from cell banking brokers. Their targets have been those that used to transact giant quantities of cash or transferred cash frequently every month.
After this, they might clone the official variety of totally different cell banking service suppliers and name the customers, principally those that obtain funds, posing as officers of the service suppliers, Col Rakibul mentioned.
“They normally focused customers who have been common recipients of funds via cell banking or monetary companies,” he added.
“The gang members then used to persuade customers, saying issues like “You’ve acquired a bonus for normal transaction in your account,” or “your sender has pressed a unsuitable quantity, as a result of which you didn’t get the cash,” mentioned Lt Col Rakibul.
“As soon as the customers fell into their lure, the gang members requested the customers to ‘dial a code’ or generally click on a hyperlink. As quickly as they entered the code or hyperlink, the fraudsters bought the PIN code, and transferred cash into their very own accounts,” he mentioned.
The Rab-Three director mentioned they’ve confirmed identities of 5 members from Sohel in main interrogation.
Concerning the gang, Rakibul mentioned there is perhaps three to 4 such gangs within the capital. “We’re additionally investigating whether or not any cell baking customers are concerned with the gang or not,” he added.
In line with Rab-Three officers, Sohel was concerned in such actions since 2017, however by no means bought arrested.
“We now have additionally come to know that Sohel purchased land and property in Tongi and Gazipur utilizing the cash he collected from the fraudulence,” ABM Faijul Islam, deputy director of Rab-3, advised The Each day Star.
Requested in regards to the sum of cash they’ve collected, Faijul mentioned that main investigations revealed that the gang members focused 5 to 10 customers per 30 days for the final three years, and conned not less than 200 customers.
“We didn’t get the precise quantity, however Sohel knowledgeable us they solely goal these customers whose transaction quantities have been not less than Tk 50,000. We will give the precise quantity after additional investigation,” mentioned the Rab-Three official.
“We now have additionally situated one other working place of the gang; we might conduct drive after pinpointing its actual location,” mentioned Faiul Islam.
“The gang managed to evade arrest as they all the time used to shut the Sim playing cards after utilizing it for calling a single person,” he mentioned.
The gang members have been additionally skilled in hiding their location via “bouncing” the calls, for which regulation enforcers discovered it tough to find them, mentioned the Rab-Three official.
“We’re additionally investigating the position of Sim card distributors, as we discovered a member of the gang used to work as a Sim card distributor of a cell operator previously,” added the deputy director.