binnenkant van een gigantische cyberfraude: hoe 32 bankmedewerkers 1,7 miljard euro doorliepen

binnenkant van een gigantische cyberfraude: hoe 32 bankmedewerkers 1,7 miljard euro doorliepen

2026-04-19 buitenland

Hyderabad, zondag, 19 april 2026.
Een cyberfraudenetwerk in India wist ruim 1,7 miljard euro buitmaken met hulp van 32 bankmedewerkers. Zij gebruikten hun positie om klantgegevens te stelen en zogeheten mule-rekeningen te openen. Via 350 verspreide rekeningen werd het geld snel witgewassen. De operatie, ‘Operation Octopus 2’, leidde tot 52 arrestaties verspreid over negen staten. De fraudeurs bleven jarenlang onopgemerkt door kleine, frequente transacties te gebruiken. Politiechef V.C. Sajjanar benadrukte dat geen enkele medewerker, ongeacht functie, zal worden gespaard. Het patroon wijst op ernstige tekortkomingen in de controleprocedures van banken. Internationale autoriteiten kijken nu mee, omdat dezelfde methoden ook in Europa opvallen.

broad national sweep exposes deep corruption

Indian authorities have dismantled a large-scale cyber fraud network spanning nine states, uncovering illicit transactions worth ₹150 crore—approximately €1.7 billion. Codenamed ‘Operation Octopus 2’, the crackdown led to the arrest of 52 individuals, including 32 bank employees suspected of exploiting internal systems. These insiders allegedly enabled the creation of hundreds of mule accounts used to launder stolen funds. The operation targeted private banking staff from institutions such as IndusInd Bank, Bank of Baroda, and Federal Bank [1]. Over 350 suspicious accounts were traced across the country, linked to around 850 cybercrime incidents [2][3].

inside the mechanics of digital embezzlement

Fraudsters manipulated weak points in banking oversight to carry out prolonged theft. Compromised bank employees provided sensitive customer data and facilitated the opening of mule accounts without proper due diligence checks. Funds obtained through phishing, fake investment schemes, and digital arrest scams were rapidly dispersed across layered accounts to obscure origins. Investigators noted repeated failures in KYC (Know Your Customer) protocols, allowing criminals to exploit systemic gaps [1]. According to Hyderabad Police Commissioner V.C. Sajjanar, private sector banks showed troubling patterns in enabling fraudulent account openings [1]. The modus operandi relied on speed and fragmentation to evade detection algorithms [2][3].

law enforcement responds with coordinated raids

Sixteen specialized police units conducted simultaneous raids across Maharashtra, Delhi, Rajasthan, West Bengal, Karnataka, Gujarat, Andhra Pradesh, Telangana, and Bihar. The week-long offensive, supervised by Deputy Commissioner of Police V Aravind Babu and Assistant Commissioner R G Siva Maruthi, culminated in 52 arrests [2]. Among those detained were 15 individuals who knowingly leased their bank accounts for illegal fund routing—a practice making them criminally liable [3]. Authorities recovered 26 mobile devices, 21 forged company seals, 14 cheque books, two USB drives, and one laptop during searches [1]. Evidence suggested coordination between mid-level operatives and higher-tier orchestrators managing interstate flows [2][3].

public warnings issued amid rising scam threats

Following the arrests, senior law enforcement figures urged citizens to remain vigilant against common online traps. Investment scams, part-time job frauds, and digital arrest schemes were highlighted as growing dangers [4]. Officials emphasized that legitimate agencies never demand payments via cryptocurrency or request remote device access [4]. People are advised not to share OTPs, PINs, or passwords under any circumstance. Opening bank accounts for others—even acquaintances—constitutes criminal involvement if used for illicit transfers [4]. Immediate reporting through 1930 or cybercrime.gov.in increases recovery chances significantly [1][4].

precedent and implications for global finance

Operation Octopus 2 followed an earlier phase that saw 117 arrests across 16 Indian states, signaling sustained pressure on cybercriminal infrastructure [2]. The recurrence of insider collusion highlights vulnerabilities in financial compliance frameworks beyond borders [1]. Similar methods have surfaced in Europe, prompting concern among European cybersecurity agencies about parallel risks [GPT]. Financial regulators stress stricter employee monitoring and enhanced transaction analytics to prevent abuse. As digital attacks grow bolder, international cooperation becomes essential to combat organized cyber fraud syndicates leveraging institutional weaknesses abroad [1][2][3].

Bronnen


cybercriminaliteit financiële fraude