New Delhi: In a major breakthrough against organised cybercrime, the Outer North District Cyber Police of Delhi Police have dismantled a large-scale mule account and shell company network, uncovering a sophisticated financial system used to launder cheated money across India and beyond. Two accused acting as dummy directors have been arrested in connection with the case.
The case was registered under relevant provisions of the Bharatiya Nyaya Sanhita (BNS) following actionable intelligence developed through the National Cyber Crime Reporting Portal (NCRP) and inputs from the Indian Cyber Crime Coordination Centre’s Samanvaya Portal under the ongoing “Mission Mule Hunting” initiative.
Suspicious Account Triggered Probe
During analysis, a bank account linked to Messit Tradex Private Limited, maintained at a nationalised bank branch in Bawana, came under scrutiny due to abnormal transaction patterns. Investigators found that the account was connected to 336 cyber fraud complaints across multiple states, appearing repeatedly in different layers of the money trail.
₹16 Crore Flow in Just 8 Days
A detailed financial probe revealed that the account received over ₹16 crore within just eight days, indicating massive laundering activity. The transactions did not match the company’s declared business profile, raising red flags about its legitimacy.
Further analysis exposed links with more than 35 suspected shell companies, suggesting the existence of a multi-layered laundering network handling transactions worth hundreds of crores across various accounts and banks. Key operational hotspots were identified in Pitampura, Rani Bagh, and Netaji Subhash Place (NSP) areas of Delhi.
Arrest of Dummy Directors
The police arrested Sonu Kumar and Aminder Singh, who were acting as dummy directors of Messit Tradex Pvt Ltd. According to investigators, these individuals had little to no control over the company’s financial operations and were merely used as fronts.
How the Network Operated
The investigation uncovered a structured modus operandi used by cybercrime syndicates:
- Vulnerable individuals were lured with job offers, commissions, or easy money schemes
- They were made dummy directors in shell companies
- Bank accounts were opened using their KYC documents, but actual control remained with handlers
- Mobile numbers, email IDs, and net banking access were operated remotely
- Funds obtained through cyber fraud were routed into these accounts
- Money was rapidly layered across multiple accounts to hide the trail
The accounts were often controlled by interstate and even foreign-based cybercriminal networks, making detection and tracing more complex.
Evidence and Investigation
Police have secured crucial evidence, including:
- Bank transaction records and account details
- Digital financial trails and NCRP complaint mapping
- KYC documents used to open shell companies
- Technical indicators pointing to remote control of accounts
Officials said the investigation is ongoing to identify and arrest other associates linked to the network.
Police Advisory to Public
Delhi Police has issued a strong advisory urging citizens to remain vigilant:
- Do not share bank accounts for commission or rental purposes
- Avoid becoming directors in unknown companies without verification
- Never share KYC documents with strangers
- Report cyber fraud immediately on helpline 1930 or www.cybercrime.gov.in
Strong Warning from Police
DCP Outer North Hareshwar Swami (IPS) stated that individuals facilitating mule accounts and shell companies are not just intermediaries but active enablers of organised economic crime.
“Such activities pose a serious threat to financial security. Under Mission Mule Hunting, Delhi Police is committed to dismantling every layer of this network,” he said.
This crackdown highlights the growing sophistication of cybercrime networks and the critical role of financial channels in sustaining such illegal operations.

