
Cop Duped of ₹7.58 Lakh After Downloading Malicious APK from WhatsApp Group
In a shocking case of cyber fraud in Mumbai, a 36-year-old police constable attached to Trombay police station lost ₹7.58 lakh after unknowingly downloading a malicious APK file from a trusted WhatsApp group. The incident highlights the growing threat of sophisticated cyber scams targeting even law enforcement personnel.
How It Happened
Constable Sachin Kashid was an active member of the Mohalla Committee WhatsApp group—formed to maintain coordination between police and local residents. On July 22, a message containing an Android APK file named “RTO Challan.apk” was circulated in the group from an unknown number. Assuming it might be official or important, Kashid clicked the link. However, due to being occupied with other tasks, he did not give it further attention.
Two hours later, Kashid received an alert that a loan of ₹7.58 lakh had been credited to his salary account. Within minutes, he was notified that two separate amounts—₹4,99,007.08 and ₹2,55,007.08—had been debited from his account using a payment system identified as CCAHPPAY. It became clear he had fallen victim to a cyber fraud.
Immediate Action and Delays
Realising the scam, the constable promptly dialed the national cyber helpline number 1930 to report the incident. Despite his swift action, he learned on July 27 that his complaint had not been officially registered due to a “technical error.” He had to refile the complaint on the same day. Additionally, Kashid alleged that hackers forged digital documents in his name to obtain the fraudulent loan.
Investigation Insights
The case took an intriguing turn during investigation. Cyber police discovered that the infected APK file was shared in the group by a member who was widely respected in the locality. Upon inquiry, it was revealed that this individual’s phone had also been infected by the same malware. Without his knowledge, the malicious file had auto-forwarded to his contacts and groups, including the Mohalla Committee group. This twist revealed how malware could exploit devices to propagate itself and gain trust through seemingly reliable sources.
Wider Implications
This incident underscores how cybercriminals are using advanced social engineering tactics to breach even secure circles like police-community forums. The use of an APK file disguised as an official-looking document (in this case, an RTO challan) played a key role in deceiving the victim. Moreover, leveraging a familiar community platform amplified the attack’s credibility.
The use of instant loan disbursal and fake document forging also indicates a deeper nexus of cybercrime operations that are capable of accessing financial systems and third-party payment gateways to extract money within minutes.
Conclusion
The Trombay constable’s ordeal serves as a cautionary tale for all—especially those in official or community roles. Cyber threats today can exploit trust, familiarity, and urgency to trap even the most vigilant individuals. The case also brings attention to the need for improved digital awareness, prompt complaint resolution, and stronger scrutiny of app downloads and links, even when they come from trusted WhatsApp groups.
Authorities continue to investigate the matter, but this episode reinforces a critical lesson: never download unknown APK files, even from trusted platforms.