NextFin News - A sitting judge of the Bombay High Court has become the latest high-profile victim of a sophisticated credit card reward points scam, losing over ₹6 lakh in a digital heist that underscores the growing vulnerability of even the most legally astute individuals. The incident, which occurred on February 28 and led to a police complaint on March 7, 2026, highlights a critical flaw in the digital ecosystem: the weaponization of search engine results and the psychological manipulation of "reward redemption."
The fraud began when the judge, seeking to redeem reward points on an HDFC Bank credit card, performed a routine online search for the bank’s customer care number. This initial step—a common reflex for digital consumers—led the judge to a fraudulent helpline number strategically placed at the top of search results. According to the First Information Report (FIR) registered at Mumbai’s Cuffe Parade police station, the individual on the other end of the line posed as a bank representative and convinced the judge to download a malicious application file via WhatsApp to "process" the rewards.
The technical sophistication of the attack was evident in its cross-platform persistence. When the malicious file failed to open on the judge’s iPhone—likely due to Apple’s stringent "walled garden" security protocols—the judge transitioned to another smartphone in the household to complete the process. Upon installing the app and entering credit card credentials into a spoofed webpage, the judge was hit with four high-value transactions totaling ₹6,02,566. The speed of the theft left no room for manual intervention, as the judge only realized the deception after receiving automated transaction alerts via email.
This case is not an isolated anomaly but rather a symptom of a broader "search engine poisoning" trend that has plagued India’s digital banking sector throughout 2025 and into early 2026. By using Search Engine Optimization (SEO) or paid advertisements, cybercriminals ensure their fake helplines appear above legitimate bank contacts. Data from the Reserve Bank of India (RBI) indicates that while digital payment volumes have surged, the complexity of social engineering—where the victim is coerced into bypassing their own security—has outpaced traditional technical safeguards like two-factor authentication.
The legal fallout of the incident has seen Mumbai police invoke multiple sections of the Bharatiya Nyaya Sanhita (BNS) and the Information Technology Act, including charges for cheating by impersonation. However, the recovery of funds in such cases remains notoriously difficult once the money is laundered through a series of "mule" accounts or converted into cryptocurrency. The fact that a high court judge, trained in the nuances of evidence and deception, could be duped suggests that the current "user-beware" model of digital security is reaching its breaking point.
Financial institutions are now facing renewed pressure to move beyond static warnings. The transition from the judge's secure iPhone to a secondary device to bypass security hurdles illustrates a "human-in-the-loop" vulnerability that software alone cannot fix. As the Mumbai police continue their investigation into the unidentified perpetrators, the incident serves as a stark reminder that in the current digital landscape, the prestige of one's office offers no protection against the clinical efficiency of a well-executed script and a fraudulent link.
Explore more exclusive insights at nextfin.ai.

