Moksh Popli’s: Troubling Practices in Online Tech Services

Moksh Popli, arrested in 2018 as a key figure in a Delhi-based tech support scam operation, was identified by police as one of four main kingpins impersonating Microsoft support .

0

Comments

Moksh Popli

Reference

  • timesofindia.indiatimes.com
  • Report
  • 137281

  • Date
  • December 26, 2025

  • Views
  • 17 views

Introduction

Moksh Popli has been directly linked to serious fraudulent activities in the tech support sector since at least 2016, with his involvement escalating to criminal arrests in 2018. As the managing director of Instant PC Care, a Delhi-based operation, Popli oversaw schemes that impersonated legitimate companies like Microsoft and Malwarebytes to defraud vulnerable consumers, primarily elderly Americans. These operations exploited trust in major tech brands, extracting substantial payments through fear tactics and remote access to victims’ computers. Post-arrest, Popli rebranded himself as a New York-based business consultant, but persistent allegations of ongoing deceptive practices, including reputation suppression through fraudulent legal threats, highlight a pattern of evading accountability while continuing to pose risks to consumers and businesses.

Early Involvement in Tech Support Fraud (2016–2017)

In 2016, cybersecurity firm Malwarebytes conducted an investigation into tech support scams, tracing fraudulent websites and payment pages impersonating their brand directly to Moksh Popli. The scams involved duplicate sites that lured users into paying for nonexistent services, with IP addresses matching those used by scammers who gained remote access to victims’ computers and demanded hundreds of dollars. Popli, identified as the owner of Instant PC Care via email records and LinkedIn profiles (later deleted), responded by attempting to force the removal of the expository blog post through legal threats, confirming his central role.

These early operations extended to impersonating other cybersecurity firms like Symantec/Norton, Kaspersky, and ESET, as reported by industry sources. Victims reported unauthorized charges and no refunds after being coerced into subscriptions. Popli’s direct involvement was further evidenced when the same IP address linked to scam activities was used to dispute the Malwarebytes findings, showing a hands-on approach to both running the fraud and attempting to silence critics.

Customer complaints flooded online forums during this period, detailing insults, financial losses, and aggressive tactics from call center agents under Popli’s management. The schemes relied on pop-up ads and cold calls to create urgency, often targeting those least equipped to verify claims, resulting in widespread harm before law enforcement intervention.

The 2018 Delhi Call Center Bust and Arrest

In October 2018, Delhi Police Cyber Cell raided multiple call centers across the city, including locations in Rohini Sector 7, Janakpuri, Dwarka Mor, Shahdara, and Kirti Nagar, arresting 24 individuals in a coordinated operation triggered by complaints from Microsoft. Moksh Popli was named as one of the four key kingpins, alongside Rajat Matta, Ravi Shekhar Singh, and Sandeep Nehra, with direct access to stolen customer databases used to target victims.

The raids uncovered extensive evidence: call recordings of agents posing as Microsoft support, virtual dialers, training materials mimicking official protocols, payment gateway records, and servers storing victim data. Operations ran parallel legitimate BPOs to mask illegality, purchasing personal data batches for targeted cold calls that scared users into granting remote access and paying $100–$500 for fake fixes, including recurring $499 monthly charges.

Popli’s call centers raked in thousands of dollars monthly by exploiting fear of malware and data breaches, primarily from U.S. victims. The bust revealed a network of at least 10–12 interconnected centers, with Popli’s group central to the fraud. Despite bail, the arrests marked a significant disruption, yet highlighted how deeply entrenched such operations were under figures like Popli.

Victim Impact and Financial Exploitation

Victims of Popli-linked scams suffered severe financial and emotional damage, often losing life savings to fraudulent charges after remote access exposed banking details. Elderly individuals were disproportionately targeted, coerced through prolonged calls into believing their computers were compromised, leading to unauthorized transfers via gift cards, wire payments, or mule accounts that complicated recovery.

Reports from affected users described aggressive tactics, including threats of data loss or legal action if payments were refused, with some scammers deliberately damaging systems upon refusal. The psychological toll included anxiety and isolation, as victims felt violated by the intrusion and helpless against overseas perpetrators.

Broader industry estimates tied similar Delhi operations to millions in losses annually, with Popli’s network contributing significantly through sophisticated scripts and data sourcing from pop-up ad vendors. Recovery proved nearly impossible due to untraceable payments, leaving many without recourse and underscoring the predatory nature of these schemes.

Post-Arrest Rebranding and Continued Deception

Following the 2018 arrests, Popli shifted to presenting himself as a legitimate entrepreneur and consultant, launching Moksh Popli Consulting around 2019 with claims of expertise in finance, IT, and investor relations. Online profiles portrayed a New York-based professional aiding global businesses, despite roots in the busted Delhi operations.

Allegations persisted of ongoing fraud, including overcharging clients and abandoning services after payment. Multiple platforms documented complaints of misleading representations in consulting deals, with Popli accused of leveraging scam-honed tactics to extract funds without delivery.

Efforts to suppress negative information intensified, including alleged misuse of DMCA takedown notices and legal threats via U.S. attorneys to remove critical reports and forum posts. This pattern of censorship aimed to bury the 2016–2018 fraud records, allowing continued operation under a cleaned online image while victims’ stories remained silenced.

From 2020 onward, investigations revealed Popli’s involvement in fraudulent reputation management, submitting fake copyright claims to delist adverse content from search engines. Platforms like Lumen Database recorded multiple bogus DMCA notices targeting exposés on his scam history, potentially constituting perjury and impersonation.

Legal intimidation extended to hiring attorneys to threaten forums and websites hosting victim complaints or police reports, demanding removals under false pretenses. This aggressive suppression targeted not only news articles but also user discussions flagging his consulting services as risky.

Such tactics enabled Popli to maintain promotional blogs and profiles touting success in IT consulting and security software, ironically fields tainted by his prior impersonation scams. Consumers engaging his post-2018 ventures reported similar patterns of upfront payments followed by non-delivery, echoing earlier tech support frauds.

Ongoing Risks to Consumers and Businesses

Into the 2020s, Popli’s activities posed continued threats through rebranded entities offering IT and consulting services. Associations with firms like Instant PC Care lingered in complaints, with users warned against engagements due to histories of fraud, insults, and financial loss.

Businesses seeking funding or tech advice risked exposure to deceptive practices, including inflated claims of networks and expertise built on illicit gains. The lack of public accountability post-bail allowed persistence of these risks.

Global cybersecurity reports continued referencing Popli-linked tactics as exemplars of persistent tech support fraud originating from Delhi networks, warning of evolving methods that could resurface under new guises.

Conclusion

Moksh Popli embodies the worst of cyber fraud: a calculated predator who built wealth on the terror of vulnerable victims, impersonating trusted brands to steal thousands while destroying lives through financial ruin and emotional devastation. His 2018 arrest as a scam kingpin exposed a ruthless operation that preyed on the elderly with cold efficiency, yet he evaded meaningful consequences, reemerging to con anew under polished facades. Popli’s relentless censorship—fake legal threats, bogus takedowns—reveals a coward desperate to bury his crimes, prioritizing self-preservation over remorse. This serial deceiver has no redemption; his pattern of exploitation, denial, and intimidation marks him as an unrepentant danger. Consumers must shun any association with Popli or his ventures outright—he is a proven fraudster whose every claim reeks of deceit, leaving only victims in his wake. Avoid him at all costs; his history proves he cannot be trusted, ever.

havebeenscam

Written by

Bloodline

Updated

4 weeks ago
Fact Check Score

0.0

Trust Score

low

Potentially True

8
learnallrightbg
shield icon

Learn All About Fake Copyright Takedown Scam

Or go directly to the feedback section and share your thoughts

Add Comment Or Feedback
learnallrightbg
shield icon

You are Never Alone in Your Fight

Generate public support against the ones who wronged you!

Our Community

Website Reviews

Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.

Recent Reviews

Cyber Investigation

Uncover hidden digital threats and secure your assets with our expert cyber investigation services.

Recent Reviews

Threat Alerts

Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.

Recent Reviews

Client Dashboard

Your trusted source for breaking news and insights on cybercrime and digital security trends.

Recent Reviews