SlideShare uma empresa Scribd logo
1 de 2
 HYPERLINK 
http://www.sharefraud.in/?p=11
 Fraudulent Online Share Transactions By Hacking Certain unknown persons executed fraudulent trade by selling a call option of 5500 shares of BEL Ltd. in the trading code of CM01 allotted by the broker M/s CMA Securities Pvt. Ltd. in the name of Shri M. K. Chopra. This trading had been done by using User ID and password provided to their client M/s. Sanvyy Shares Traders Pvt. Ltd based in Dwarka [...] Certain unknown persons executed fraudulent trade by selling a call option of 5500 shares of BEL Ltd. in the trading code of CM01 allotted by the broker M/s CMA Securities Pvt. Ltd. in the name of Shri M. K. Chopra. This trading had been done by using User ID and password provided to their client M/s. Sanvyy Shares Traders Pvt. Ltd based in Dwarka. M/s CMA Securities Pvt. Ltd. is a registered broker of National Stock Exchange Ltd. The director of M/s CMA Securities Pvt. Ltd. lodged a complaint with the police and based on the complaint a FIR was registered and investigation was taken up by the Cyber Crime Section of Economic Offences Wing of Delhi Police because the case pertains to online fraudulent transactions.  The system log of Sanvyy shares was examined and the same revealed that on the day of the transaction i.e. on 27.06.2005, the NSE network was never logged on from M/s Sanvyy Shares. In fact their network was down with effect from 24/06/2005 due to a hardware failure. It was evident that someone had done the above trading from some other system using the complainant UserID and Password. The said shares had a strike price of Rs 600 per share with the market price of Rs. 715 per share. With the call option of Rs 115 per share someone, on behalf of CMA Securities had simply dumped all the shares to a buyer @ Rs 2 per share. The total loss involved was Rs 6.15 lacs, in the complete transaction.  The information collected from the National Stock Exchange disclosed that the said call options were purchased by one Siddarth Basu in the name of Debnath Basu through another registered NSE broker M/s India Shareline Securities Ltd. The members connect to the trading system of the exchange through X.25 connectivity and IP address was not captured by the trading system of the exchange. In fact, the software provided by the NSE & Financial Technologies to the brokers did not provide for capturing of IP Addresses. The matter was taken up with NSE who thereafter issued the instructions to include IP monitoring & capturing in the programmes provided to the brokers by the software companies authorised by the NSE.  A detailed analysis of the systems installed at the office of the complainant was conducted. It was found that the licensed trader was connected through a computer to computer link (CTCL) trading facility with the licensed Trading Member. This CTCL terminal first connected to the CTCL Server of the Trading Member, in this case the complainant, and order were then routed to the trading system of the National Stock Exchange (NSE).  The user id and the password used to access the CTCL server of the Trading Member which was connected to the trading system of the NSE, were maintained and validated by the trading members. The member connected to the trading system of the exchange through X.25 connectivity and IP address was not captured by the trading system of the exchange. A software called Neat XS was provided by the National Stock Exchange to all its Trading Members for carrying on the transactions.  The CTCL server of the complainant was installed behind a firewall server for protection. As the trading member and client connectivity was a closed private network, the fraudulent transactions could only have been done by a person who knew how to bypass the firewall server to access the CTCL server. An analysis of the log of the firewall server revealed that it was being emailed at fixed intervals to a rediff mail ID. The configuration of the firewall server also revealed the presence of unallotted IP addresses which could be used to access the CTCL server.  Information sought by investigating agency from Rediff mail revealed that the Mail ID to which the logs were being sent belonged to one Sahil Saini, the system administrator who had designed and installed the firewall system. Investigation revealed that the User_ID, Password and software were provided by Sahil who passed it on to his associates and friends Manoj Sharma and Siddarth Basu. Thereafter, the accused persons in a planned conspiracy, executed the sale of 5,500 shares of BEL Ltd. in the trading code of CM01, belonging to the complainant, using the stolen user_ID and Password.  The accused Siddarth Basu age 25 years s/o Debnath Basu R/o H. No. 221, Gali No. 3, JB Colony, Modi Nagar & Sahil Saini age 24 years, r/o D-321, Mukherjee Nagar, Delhi and co-accused Manoj Sharma have been arrested. Sahil Saini holds a diploma in software design and hardware maintenance and was working as a system designer and administrator in a computer firm M/s Elegant Systems based at Karol Bagh. Sahil Saini on behalf of M/s Elegant Systems had designed and installed the network as well as the firewall at M/s CMA Securities. Siddarth Basu holds a diploma in data processing and was working at Kandpal Securities, Connaught Place, as a computer operator. Siddarth Basu disclosed to the police that the fraudulent transaction involving sale of 5,500 shares of BEL Ltd. has been executed from a Cyber Cafe at Modi Nagar and the purchase transaction was carried out from a Cyber Cafe at K.G. Marg, Delhi. The CPU configured to execute the fraudulent transactions has been recovered from the residence of the accused.  Investigation has established that the above accused persons in pursuance of criminal conspiracy have executed the fake transactions of sell of 5500 shares of BELL Ltd. from the account of Shri M. K. Chopra and correspondingly buy the same causing wrongful loss to the complainant and corresponding gain to themselves. The chargesheet has been filed against the aforesaid accused persons and trial is on.  HYPERLINK 
http://www.neerajaarora.com/
 Neeraj Aarora (Advocate)
Fraudulent Online Share Transactions By Hacking

Mais conteúdo relacionado

Mais de Neeraj Aarora

Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj Aarora
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...Neeraj Aarora
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYNeeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 

Mais de Neeraj Aarora (7)

Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Fraudulent Online Share Transactions By Hacking

  • 1. HYPERLINK http://www.sharefraud.in/?p=11 Fraudulent Online Share Transactions By Hacking Certain unknown persons executed fraudulent trade by selling a call option of 5500 shares of BEL Ltd. in the trading code of CM01 allotted by the broker M/s CMA Securities Pvt. Ltd. in the name of Shri M. K. Chopra. This trading had been done by using User ID and password provided to their client M/s. Sanvyy Shares Traders Pvt. Ltd based in Dwarka [...] Certain unknown persons executed fraudulent trade by selling a call option of 5500 shares of BEL Ltd. in the trading code of CM01 allotted by the broker M/s CMA Securities Pvt. Ltd. in the name of Shri M. K. Chopra. This trading had been done by using User ID and password provided to their client M/s. Sanvyy Shares Traders Pvt. Ltd based in Dwarka. M/s CMA Securities Pvt. Ltd. is a registered broker of National Stock Exchange Ltd. The director of M/s CMA Securities Pvt. Ltd. lodged a complaint with the police and based on the complaint a FIR was registered and investigation was taken up by the Cyber Crime Section of Economic Offences Wing of Delhi Police because the case pertains to online fraudulent transactions. The system log of Sanvyy shares was examined and the same revealed that on the day of the transaction i.e. on 27.06.2005, the NSE network was never logged on from M/s Sanvyy Shares. In fact their network was down with effect from 24/06/2005 due to a hardware failure. It was evident that someone had done the above trading from some other system using the complainant UserID and Password. The said shares had a strike price of Rs 600 per share with the market price of Rs. 715 per share. With the call option of Rs 115 per share someone, on behalf of CMA Securities had simply dumped all the shares to a buyer @ Rs 2 per share. The total loss involved was Rs 6.15 lacs, in the complete transaction. The information collected from the National Stock Exchange disclosed that the said call options were purchased by one Siddarth Basu in the name of Debnath Basu through another registered NSE broker M/s India Shareline Securities Ltd. The members connect to the trading system of the exchange through X.25 connectivity and IP address was not captured by the trading system of the exchange. In fact, the software provided by the NSE & Financial Technologies to the brokers did not provide for capturing of IP Addresses. The matter was taken up with NSE who thereafter issued the instructions to include IP monitoring & capturing in the programmes provided to the brokers by the software companies authorised by the NSE. A detailed analysis of the systems installed at the office of the complainant was conducted. It was found that the licensed trader was connected through a computer to computer link (CTCL) trading facility with the licensed Trading Member. This CTCL terminal first connected to the CTCL Server of the Trading Member, in this case the complainant, and order were then routed to the trading system of the National Stock Exchange (NSE).  The user id and the password used to access the CTCL server of the Trading Member which was connected to the trading system of the NSE, were maintained and validated by the trading members. The member connected to the trading system of the exchange through X.25 connectivity and IP address was not captured by the trading system of the exchange. A software called Neat XS was provided by the National Stock Exchange to all its Trading Members for carrying on the transactions. The CTCL server of the complainant was installed behind a firewall server for protection. As the trading member and client connectivity was a closed private network, the fraudulent transactions could only have been done by a person who knew how to bypass the firewall server to access the CTCL server. An analysis of the log of the firewall server revealed that it was being emailed at fixed intervals to a rediff mail ID. The configuration of the firewall server also revealed the presence of unallotted IP addresses which could be used to access the CTCL server. Information sought by investigating agency from Rediff mail revealed that the Mail ID to which the logs were being sent belonged to one Sahil Saini, the system administrator who had designed and installed the firewall system. Investigation revealed that the User_ID, Password and software were provided by Sahil who passed it on to his associates and friends Manoj Sharma and Siddarth Basu. Thereafter, the accused persons in a planned conspiracy, executed the sale of 5,500 shares of BEL Ltd. in the trading code of CM01, belonging to the complainant, using the stolen user_ID and Password. The accused Siddarth Basu age 25 years s/o Debnath Basu R/o H. No. 221, Gali No. 3, JB Colony, Modi Nagar & Sahil Saini age 24 years, r/o D-321, Mukherjee Nagar, Delhi and co-accused Manoj Sharma have been arrested. Sahil Saini holds a diploma in software design and hardware maintenance and was working as a system designer and administrator in a computer firm M/s Elegant Systems based at Karol Bagh. Sahil Saini on behalf of M/s Elegant Systems had designed and installed the network as well as the firewall at M/s CMA Securities. Siddarth Basu holds a diploma in data processing and was working at Kandpal Securities, Connaught Place, as a computer operator. Siddarth Basu disclosed to the police that the fraudulent transaction involving sale of 5,500 shares of BEL Ltd. has been executed from a Cyber Cafe at Modi Nagar and the purchase transaction was carried out from a Cyber Cafe at K.G. Marg, Delhi. The CPU configured to execute the fraudulent transactions has been recovered from the residence of the accused. Investigation has established that the above accused persons in pursuance of criminal conspiracy have executed the fake transactions of sell of 5500 shares of BELL Ltd. from the account of Shri M. K. Chopra and correspondingly buy the same causing wrongful loss to the complainant and corresponding gain to themselves. The chargesheet has been filed against the aforesaid accused persons and trial is on. HYPERLINK http://www.neerajaarora.com/ Neeraj Aarora (Advocate)