The Art of Fraud — India Edition
- Shobhit Sharma
- Jun 28
- 4 min read
Over the past few years, I’ve had the opportunity to work across some of India’s most active fraud domains—payments, fintech, and real-money gaming (RMG).
In this time, I’ve encountered fraud in its many forms:
From victims seeking help… to suspects manipulating systems.
From chargebacks and account takeovers… to field-level investigations and cross-functional resolutions.
What I’ve learned is simple:
Fraud is not random. It is an art form — structured, psychological, and repeatable.
Why Study the Mind of a Fraudster?
Most anti-fraud efforts focus on prevention — what to build, detect, or block.
But if we stop and study how fraudsters think, we unlock something deeper:
“When you think like a fraudster, you stop being surprised by fraud.”
Understanding mindset is more than profiling — it’s pattern recognition.
The deeper we go, the more predictable it becomes.
What Drives a Fraudster?
Regardless of method or channel, the root motivators remain consistent. A fraudster’s world is driven by two engines:
Financial Gain
The most obvious driver. But behind it can lie:
Unemployment or lack of access
Peer pressure or commission-based fraud networks
Aspirational lifestyle gaps or local economic disparity
Psychological Satisfaction
Many fraudsters continue long after they’ve “earned enough.” Why?
Power – Outsmarting victims or systems
Control – Manipulating someone into action
Ego – Proving superiority, especially over “tech platforms”
Revenge – Against systems they feel excluded by
Common Rationalizations
To commit consistent fraud, one must internally justify it.
Here’s how fraudsters across types rationalize their actions:
Fraud isn’t just a crime — it’s an ideology of justification.
Anatomy of a Fraud: From Thought to Theft
Understanding the phases of fraud gives us a sharper lens to decode it.
Attack Surface – Scoping the Target
Fraudsters don’t act blindly. They use:
Social media, call recordings, and spam leaks
Trash bills, courier slips, KYC photos
Insider sales info or leaked databases
Targeting isn’t random — it’s profiled.
Attack Vector – Launching the Exploit
Once the victim is mapped, fraudsters deploy tactics like:
Impersonation calls
Fake refund/KYC expiry requests
Remote access links or cloned apps
Manipulated trust gestures (urgency, authority, flattery)
The goal: convert trust into a transaction.
The Indian Fraudster Spectrum
Based on my direct field insights, here's how Indian fraud actors typically group by intent, network, and skill:
Low-Tech Opportunists
"Small-town Callers"
Profile:
Tier 2–3 towns (like Mewat, Jamtara, Bharatpur)
Age 18–35, basic education
Work in small rings with prepaid SIMs
MO:
Fake bank/KYC calls
Lottery/refund UPI collect requests
SMS links for phishing
Tools:
Caller ID spoofers
WhatsApp Business
Fake RBI documents in PDF
Social Hackers
"Relationship Builders"
Profile:
Skilled manipulators (age 25–40)
Operate solo or in pairs
Target vulnerable/lonely individuals
MO:
Online romance scams
Fake parcel/customs fraud
Telegram-based emotional traps
Tools:
Fake Facebook/Instagram profiles
Courier-like tracking URLs
Emotional manipulation scripts
Cyber-Trained Operators
"Scam Techies"
Profile:
Ex-BPO/tech support workers
Fluent in Hindi & English
Skilled in spoofing, VPNs, fraud stacks
MO:
Fake investment & crypto apps
Remote access frauds (AnyDesk, TeamViewer)
Job/task-based scams, phishing OTPs
Tools:
Custom APKs and cloned websites
SEO bots and targeted SMS
Offshore laundering gateways
Field-Level Enablers
"Fraud Enablers"
Profile:
SIM sellers, courier agents, KYC agents
Enable fraud passively for quick cash
MO:
Opening mule wallets/accounts
Selling verified SIMs
Supplying photos or fake PAN/Aadhaar
Tools:
Photo editing apps
Insider access to data leaks
Links to fraudsters via Telegram
High-Level Syndicates
"Organized Networks"
Profile:
State-spanning networks with insider access
Coordinated laundering rings
Often use shell firms, merchant fraud, IVR bots
MO:
Large-scale merchant onboarding fraud
Refund abuse & chargebacks
Fake ecommerce + fund routing
Tools:
Botnets, SMS gateways, fake IVR menus
UPI clones & UI mimics
Layered mule networks for laundering
Inside Threat Actors
Profile:
Employees in banks, BPOs, fintechs
Motivated by greed or ideology
Exploit privileged access
MO:
Selling user data
Approving fake KYC/loans
Overriding account limits
Tools:
Admin dashboards
Screenshotting & leak sharing
Telegram/dark web deals
Hypothetical Snapshot: The Bareilly Data Mule
A 19-year-old cybercafé owner starts by offering KYC onboarding “help” to a stranger online. Months later, he’s routing PANs, selfies, and Aadhaar numbers for ₹500 each—onboarding 300+ wallets now used for scams. He never sees a single rupee of the fraud itself.
“I didn’t scam anyone. I just shared the data they needed.”
Final Thought: Fraud Is Not Random
Fraud in India is behavioral, economic, and deeply human. It’s not a software bug — it’s a design, a strategy, and often, a business model. Learn here how they operate.
If we want to outsmart fraudsters, we must:
Understand their mental maps
Study their social and operational structures
Build systems and awareness that predict behavior — not just patch symptoms
This is the first edition of “The Art of Fraud” — a series exploring crimes from the fraudster’s lens. Future chapters will decode modi operandi, from romance scams to refund frauds, via real pattern breakdowns.
This piece is part of Kncok's Fraud Intelligence Series, blending real-world cases, insider research, and psychological pattern decoding.


Comments