Ahmedabad ATS Busts Spy Ring: Trojan Malware, Fake Profiles & Pak Handlers Exposed
Ahmedabad ATS Uncovers Espionage Network with Trojan, Fake IDs

In a significant breakthrough, the Gujarat Anti-Terrorist Squad (ATS) has unraveled a structured espionage network operating with alarming precision. The investigation, centered in Ahmedabad, exposed a sophisticated operation involving malware, deceptive online identities, and instructions from foreign handlers based in Pakistan.

Digital Trail Leads to Army Data Breach

As the probe deepened, the ATS meticulously pieced together the communication chain between the accused individuals and their overseas controllers. A key development came when investigators questioned Ajaykumar Surendrasingh. During interrogation, he confessed to sharing sensitive transfer and unit details of Army personnel while he was posted. The digital evidence solidified this admission: officers successfully recovered a Trojan malware file from his electronic device. This confirmed a deliberate attempt to infiltrate and access his stored data.

Fake Profile & Pakistani Handlers: The Modus Operandi

The ATS then turned its attention to another suspect, Rashmani Pal. A forensic analysis of her call records revealed a pattern of regular communication originating from Pakistani phone numbers. Notably, these calls spiked during periods when she was actively trying to initiate contact with individuals serving in the Indian Army.

Officials disclosed that Pal operated under the fabricated identity of "Priya Thakur". This fake profile was strategically used to build trust and rapport with targets who had been identified by the foreign handlers. Further examination of digital evidence from her phone yielded incriminating lists of mobile numbers. These lists were supplied by two Pakistan-based Intelligence Operatives (PIOs) identified as "Abdul Sattar" and "Khalid", indicating her role was to expand the network's reach.

Financial Links & Multi-State Coordination

The investigation took a financial turn when tracking teams discovered that a newly opened payments bank account in Pal's name was being used to move funds under direct instruction from abroad. This pointed to a well-funded operation.

To verify local connections and the full extent of the network, the Ahmedabad ATS coordinated closely with police forces from Uttar Pradesh, Goa, and the Daman Crime Branch. The consolidated findings from this multi-agency effort painted a clear picture of a structured espionage network with defined roles for each participant.

The gravity of the uncovered plot prompted the ATS to formally register a First Information Report (FIR). The case has been filed under stringent legal sections dealing with criminal conspiracy and anti-national activities.