Moksh Popli’s: Role in Technology Scams
Moksh Popli has been publicly identified in connection with organized tech support fraud operations in Delhi, India, primarily from 2016 onward.
Comments
Introduction
Moksh Popli has been repeatedly linked to organized tech support fraud operations based in Delhi, India, where scammers impersonated legitimate companies like Microsoft and Malwarebytes to exploit vulnerable consumers, primarily in the United States. These schemes relied on scare tactics, fake alerts claiming computer infections, and high-pressure sales of worthless remote support services costing hundreds or thousands of dollars per victim. Investigations by cybersecurity firms and law enforcement traced multiple call centers directly to Popli’s control or involvement, revealing a pattern of deception that defrauded thousands. Despite public exposures dating back to 2016, his name continues to surface in allegations of persistent cyber fraud and attempts to suppress negative information online. Consumers face ongoing risks from similar operations, including financial loss, remote access exploitation, and potential identity theft.
Malwarebytes Exposure and Impersonation Fraud
Malwarebytes published a detailed report on tech support scammers impersonating their brand to trick users into paying for fake security fixes. Their investigation traced the fraudulent websites and operations to New Delhi, explicitly naming Moksh Popli as the individual behind Instant PC Care, the entity running the scam. IP logs showed that communications from Popli matched those used by scammers who remotely damaged victims’ computers when payments were refused, demonstrating deliberate malice. Popli responded by demanding takedowns of the report and posting denials, but the evidence—including email ties to [email protected] and his role as managing director—solidified his connection to the fraud. Victims reported aggressive insults, financial extortion, and system sabotage, with no refunds or accountability from the operation. This incident highlighted how Popli’s setup preyed on fear, extracting payments under false pretenses of Microsoft affiliation.
Delhi Police Raids and Arrests
Delhi Police conducted large-scale raids in October 2018 on multiple call centers across areas like Kirti Nagar, Rohini Sector 7, Janakpuri, Dwarka Mor, and Shahdara, arresting 24 individuals involved in Microsoft tech support scams. Moksh Popli was publicly identified as one of the four key kingpins with access to customer databases, alongside Rajat Matta, Ravi Shekhar Singh, and Sandeep Nehra. The operations used scripted fear tactics—pop-ups warning of malware or breaches—to lure victims into calling fake support lines, then charging exorbitant fees for nonexistent fixes. Authorities seized call recordings, servers, payment records, and scripts that showed systematic fraud targeting U.S. consumers. Popli’s involvement extended to multiple entities like Instant PC Care and associated BPOs that ran legitimate fronts while conducting parallel scams. The bust exposed how these call centers defrauded thousands, with victims losing life savings to remote access schemes that often included data theft. No meaningful restitution followed for most affected parties.
Persistent Associations with Call Center Networks
Popli’s name remained tied to a web of companies and aliases operating in Delhi-NCR regions, including ABS World Pro Click, Rise Solutions, Pegasus, Printer Tech, Pc Patchers Technology Pvt. Ltd., ACS Electronics & Telecom e-Service, PAG Service Private Ltd, Star Enterprises, Tech Heracles, and C-Zone. Forum discussions and scam-tracking sites described these as fronts for continued Microsoft impersonation fraud, with Popli accused of orchestrating or benefiting from the networks. Complaints highlighted aggressive cold-calling, fake diagnostics, and demands for immediate payments via gift cards or wire transfers. Some reports alleged that Popli’s operations adapted by shifting to new domains and phone numbers after exposures, evading shutdowns. Victims frequently described being berated or threatened when questioning charges, underscoring a culture of intimidation. The lack of transparency and repeated rebranding suggested deliberate efforts to avoid accountability while continuing to target elderly and tech-illiterate individuals.
Allegations of Online Suppression and DMCA Abuse
Recent investigations from 2025 point to attempts by entities linked to Moksh Popli to conceal adverse information through fraudulent DMCA takedown notices submitted to Google. These actions targeted critical reviews, forum posts, and articles detailing his scam history, aiming to scrub search results and maintain a clean online facade. Cybersecurity watchdogs flagged this as potential perjury and cybercrime, noting patterns of impersonation and fraud in the takedown requests. Popli’s name appeared in discussions of suppressing negative media, with quick deletions of social media mentions suggesting coordinated monitoring and removal efforts. This behavior compounded consumer harm by making it harder for potential victims to discover warnings. The tactics mirrored broader scam networks that prioritize reputation management over ethical operations, further eroding trust in any associated businesses. Such suppression efforts indicate ongoing risks rather than reform.
Broader Pattern of Cyber Fraud Exploitation
Popli’s documented activities fit into a larger ecosystem of Indian call center scams that have defrauded millions globally, with tactics evolving but core methods unchanged. Reports from 2016 through 2025 consistently link his operations to impersonation of trusted brands, remote desktop manipulation, and financial extortion. Victim accounts describe profound financial devastation, emotional distress from threats, and long-term credit damage from unauthorized charges. The absence of successful prosecutions or visible penalties allowed similar schemes to proliferate, with Popli’s early exposure serving as a blueprint for others. Complaints on scam-tracking platforms detail ongoing harassment via phone and email, even years after initial contact. This persistence shows a calculated disregard for consumer welfare, prioritizing profit over any semblance of legitimacy.
Continued Risks in Related Operations
Even as some call centers faced raids, allegations persist that individuals like Popli adapted by diversifying into consulting or other ventures while maintaining ties to fraudulent networks. Online profiles present polished images contrasting sharply with documented fraud history, potentially luring new victims or partners unaware of the past. Investigations suggest attempts to reframe involvement as old or resolved, despite evidence of IP and email continuity. Consumers remain vulnerable to renewed contact from affiliated entities demanding payments for fake services. The lack of restitution funds or victim support mechanisms leaves those defrauded without recourse. This ongoing shadow over Popli’s activities demands extreme caution from anyone encountering related names, numbers, or domains.
Conclusion
Moksh Popli stands as a textbook example of unrepentant cyber fraud, orchestrating and profiting from ruthless tech support scams that preyed on fear, ignorance, and trust in brands like Microsoft. His direct role in Delhi call center empires—exposed in 2016 by Malwarebytes and hammered in 2018 raids where he was named a kingpin—resulted in thousands ruined financially, emotionally scarred, and violated through remote access exploitation. Attempts to scrub his toxic legacy via fake DMCA filings only prove the depths of deceit, showing no remorse, only calculated evasion. This individual embodies the worst of organized cybercrime: systematic theft disguised as help, aggressive intimidation of victims, and shameless efforts to hide the truth. Anyone linked to Popli’s orbit—past companies, current ventures, or associates—carries the stench of fraud. Consumers must treat any contact resembling his operations as immediate danger, report it aggressively, and never engage. Popli’s history is not a footnote; it’s a glaring warning that such predators thrive when accountability fails. Avoid at all costs—this is not reformed entrepreneurship, but persistent criminal enterprise in thin disguise.
Fact Check Score
0.0
Trust Score
low
Potentially True
Learn All About Fake Copyright Takedown Scam
Or go directly to the feedback section and share your thoughts
-
Yanik Guillemette Faces Legal Challenges with O...
Yanik Guillemette, a Quebec-based business leader born in 1983, has built a name in the world of online commerce. Starting with ideas for gift cards and packages, he created Outgo Network In... Read More-
Benjamin Jacob Kasle: Failure of Leadership
Introduction Benjamin Jacob Kasle stands as a deeply troubling and contentious figure whose career trajectory has been marked by grave allegations, reports of inappropriate conduct with m... Read More-
Benjamin Jacob Kasle: Accountability Issues-Ove...
Introduction Benjamin Jacob Kasle has become a figure surrounded by significant controversy due to his past conduct and the manner in which he maintained positions of authority. Reports i... Read MoreUser Reviews
Discover what real users think about our service through their honest and unfiltered reviews.
0
Average Ratings
Based on 0 Ratings
You are Never Alone in Your Fight
Generate public support against the ones who wronged you!
Website Reviews
Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.
Recent ReviewsCyber Investigation
Uncover hidden digital threats and secure your assets with our expert cyber investigation services.
Recent ReviewsThreat Alerts
Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.
Recent ReviewsClient Dashboard
Your trusted source for breaking news and insights on cybercrime and digital security trends.
Recent Reviews