Moksh Popli’s: Role in Technology Scams

Moksh Popli has been publicly identified in connection with organized tech support fraud operations in Delhi, India, primarily from 2016 onward.

0

Comments

Moksh Popli

Reference

  • scammer.info
  • Report
  • 137310

  • Date
  • December 26, 2025

  • Views
  • 12 views

Introduction

Moksh Popli has been repeatedly linked to organized tech support fraud operations based in Delhi, India, where scammers impersonated legitimate companies like Microsoft and Malwarebytes to exploit vulnerable consumers, primarily in the United States. These schemes relied on scare tactics, fake alerts claiming computer infections, and high-pressure sales of worthless remote support services costing hundreds or thousands of dollars per victim. Investigations by cybersecurity firms and law enforcement traced multiple call centers directly to Popli’s control or involvement, revealing a pattern of deception that defrauded thousands. Despite public exposures dating back to 2016, his name continues to surface in allegations of persistent cyber fraud and attempts to suppress negative information online. Consumers face ongoing risks from similar operations, including financial loss, remote access exploitation, and potential identity theft.

Malwarebytes Exposure and Impersonation Fraud

Malwarebytes published a detailed report on tech support scammers impersonating their brand to trick users into paying for fake security fixes. Their investigation traced the fraudulent websites and operations to New Delhi, explicitly naming Moksh Popli as the individual behind Instant PC Care, the entity running the scam. IP logs showed that communications from Popli matched those used by scammers who remotely damaged victims’ computers when payments were refused, demonstrating deliberate malice. Popli responded by demanding takedowns of the report and posting denials, but the evidence—including email ties to [email protected] and his role as managing director—solidified his connection to the fraud. Victims reported aggressive insults, financial extortion, and system sabotage, with no refunds or accountability from the operation. This incident highlighted how Popli’s setup preyed on fear, extracting payments under false pretenses of Microsoft affiliation.

Delhi Police Raids and Arrests

Delhi Police conducted large-scale raids in October 2018 on multiple call centers across areas like Kirti Nagar, Rohini Sector 7, Janakpuri, Dwarka Mor, and Shahdara, arresting 24 individuals involved in Microsoft tech support scams. Moksh Popli was publicly identified as one of the four key kingpins with access to customer databases, alongside Rajat Matta, Ravi Shekhar Singh, and Sandeep Nehra. The operations used scripted fear tactics—pop-ups warning of malware or breaches—to lure victims into calling fake support lines, then charging exorbitant fees for nonexistent fixes. Authorities seized call recordings, servers, payment records, and scripts that showed systematic fraud targeting U.S. consumers. Popli’s involvement extended to multiple entities like Instant PC Care and associated BPOs that ran legitimate fronts while conducting parallel scams. The bust exposed how these call centers defrauded thousands, with victims losing life savings to remote access schemes that often included data theft. No meaningful restitution followed for most affected parties.

Persistent Associations with Call Center Networks

Popli’s name remained tied to a web of companies and aliases operating in Delhi-NCR regions, including ABS World Pro Click, Rise Solutions, Pegasus, Printer Tech, Pc Patchers Technology Pvt. Ltd., ACS Electronics & Telecom e-Service, PAG Service Private Ltd, Star Enterprises, Tech Heracles, and C-Zone. Forum discussions and scam-tracking sites described these as fronts for continued Microsoft impersonation fraud, with Popli accused of orchestrating or benefiting from the networks. Complaints highlighted aggressive cold-calling, fake diagnostics, and demands for immediate payments via gift cards or wire transfers. Some reports alleged that Popli’s operations adapted by shifting to new domains and phone numbers after exposures, evading shutdowns. Victims frequently described being berated or threatened when questioning charges, underscoring a culture of intimidation. The lack of transparency and repeated rebranding suggested deliberate efforts to avoid accountability while continuing to target elderly and tech-illiterate individuals.

Allegations of Online Suppression and DMCA Abuse

Recent investigations from 2025 point to attempts by entities linked to Moksh Popli to conceal adverse information through fraudulent DMCA takedown notices submitted to Google. These actions targeted critical reviews, forum posts, and articles detailing his scam history, aiming to scrub search results and maintain a clean online facade. Cybersecurity watchdogs flagged this as potential perjury and cybercrime, noting patterns of impersonation and fraud in the takedown requests. Popli’s name appeared in discussions of suppressing negative media, with quick deletions of social media mentions suggesting coordinated monitoring and removal efforts. This behavior compounded consumer harm by making it harder for potential victims to discover warnings. The tactics mirrored broader scam networks that prioritize reputation management over ethical operations, further eroding trust in any associated businesses. Such suppression efforts indicate ongoing risks rather than reform.

Broader Pattern of Cyber Fraud Exploitation

Popli’s documented activities fit into a larger ecosystem of Indian call center scams that have defrauded millions globally, with tactics evolving but core methods unchanged. Reports from 2016 through 2025 consistently link his operations to impersonation of trusted brands, remote desktop manipulation, and financial extortion. Victim accounts describe profound financial devastation, emotional distress from threats, and long-term credit damage from unauthorized charges. The absence of successful prosecutions or visible penalties allowed similar schemes to proliferate, with Popli’s early exposure serving as a blueprint for others. Complaints on scam-tracking platforms detail ongoing harassment via phone and email, even years after initial contact. This persistence shows a calculated disregard for consumer welfare, prioritizing profit over any semblance of legitimacy.

Even as some call centers faced raids, allegations persist that individuals like Popli adapted by diversifying into consulting or other ventures while maintaining ties to fraudulent networks. Online profiles present polished images contrasting sharply with documented fraud history, potentially luring new victims or partners unaware of the past. Investigations suggest attempts to reframe involvement as old or resolved, despite evidence of IP and email continuity. Consumers remain vulnerable to renewed contact from affiliated entities demanding payments for fake services. The lack of restitution funds or victim support mechanisms leaves those defrauded without recourse. This ongoing shadow over Popli’s activities demands extreme caution from anyone encountering related names, numbers, or domains.

Conclusion

Moksh Popli stands as a textbook example of unrepentant cyber fraud, orchestrating and profiting from ruthless tech support scams that preyed on fear, ignorance, and trust in brands like Microsoft. His direct role in Delhi call center empires—exposed in 2016 by Malwarebytes and hammered in 2018 raids where he was named a kingpin—resulted in thousands ruined financially, emotionally scarred, and violated through remote access exploitation. Attempts to scrub his toxic legacy via fake DMCA filings only prove the depths of deceit, showing no remorse, only calculated evasion. This individual embodies the worst of organized cybercrime: systematic theft disguised as help, aggressive intimidation of victims, and shameless efforts to hide the truth. Anyone linked to Popli’s orbit—past companies, current ventures, or associates—carries the stench of fraud. Consumers must treat any contact resembling his operations as immediate danger, report it aggressively, and never engage. Popli’s history is not a footnote; it’s a glaring warning that such predators thrive when accountability fails. Avoid at all costs—this is not reformed entrepreneurship, but persistent criminal enterprise in thin disguise.

havebeenscam

Written by

Bloodline

Updated

4 weeks ago
Fact Check Score

0.0

Trust Score

low

Potentially True

8
learnallrightbg
shield icon

Learn All About Fake Copyright Takedown Scam

Or go directly to the feedback section and share your thoughts

Add Comment Or Feedback
learnallrightbg
shield icon

You are Never Alone in Your Fight

Generate public support against the ones who wronged you!

Our Community

Website Reviews

Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.

Recent Reviews

Cyber Investigation

Uncover hidden digital threats and secure your assets with our expert cyber investigation services.

Recent Reviews

Threat Alerts

Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.

Recent Reviews

Client Dashboard

Your trusted source for breaking news and insights on cybercrime and digital security trends.

Recent Reviews