Kalyan Banerjee Bank Fraud 2025: A shocking case of cyber fraud has rocked Bengal’s political and banking circles after Trinamool Congress (TMC) MP Kalyan Banerjee reported that ₹57 lakh had been siphoned off from a dormant account linked to him. The revelation has triggered a full-fledged cybercrime investigation and raised serious questions about India’s banking vigilance, KYC verification, and the safety of dormant accounts.
According to Banerjee, the fraudulent withdrawals were executed using forged identity documents, including fake PAN and Aadhaar details, and even a superimposed photograph of him. The perpetrators, he claims, manipulated bank records and mobile number changes to gain control of the account and move funds without detection.
This case, now popularly referred to as the “Kalyan Banerjee Bank Fraud 2025,” has become a test case for both law enforcement and banking regulators to review the digital vulnerabilities in India’s increasingly online financial ecosystem.
🏦 1. The Allegation: ₹57 Lakh Vanishes from Dormant Account
Kalyan Banerjee, a senior leader of the Trinamool Congress and a well-known lawyer by profession, discovered that ₹57 lakh had been fraudulently withdrawn from an old State Bank of India (SBI) account that had been inactive for years.
He stated that this account was created during his tenure as MLA for Asansol South in the early 2000s and was left unused after he entered Parliament. Over time, the account became dormant — a status banks assign to accounts with no activity for more than two years.
Banerjee claimed that cybercriminals reactivated the account by forging his identity through fraudulent KYC documents, changing the registered mobile number, and diverting funds electronically.
The fraudsters allegedly transferred funds into this dormant account before withdrawing them through online channels, demonstrating a deep understanding of banking processes and insider-level sophistication.
He later said publicly:
“If this can happen to a sitting MP, what about the ordinary people of India? This must be taken seriously.”
📉 2. How the Fraud Was Carried Out: Anatomy of a Cyber Heist
Experts familiar with the investigation describe this fraud as a classic case of dormant account manipulation. Once a bank account goes unused for a long period, it becomes less visible to both customers and the system, creating a blind spot that fraudsters exploit.
The likely steps include:
- Data Theft:
Fraudsters may have accessed old KYC details from compromised databases, phishing scams, or leaks. - Forged KYC Documents:
Fake documents bearing Banerjee’s name and a manipulated photo were used to reactivate the dormant account. - Mobile Number Swap:
By changing the registered mobile number, the fraudsters ensured One-Time Passwords (OTPs) and alerts reached their devices instead of Banerjee’s. - Money Movement:
The fraudsters then transferred money from a linked account to the reactivated dormant one and withdrew it digitally or via linked accounts. - Bank Alert and Probe:
When irregular activity was detected, the bank froze the account and alerted authorities.
Though the bank has reportedly refunded the siphoned amount, the broader investigation by the Kolkata Police Cyber Crime Department continues to identify the culprits and the source of the forged documents.
For more on dormant account regulations, visit the Reserve Bank of India official site.
⚖️ 3. Kalyan Banerjee Bank Fraud 2025: The Legal and Regulatory Perspective
Under Indian law, fraudulent withdrawals using forged identity fall under several sections of the Indian Penal Code (IPC) and Information Technology Act, 2000. These include:
- Section 420 (Cheating and dishonesty inducing delivery of property)
- Section 468 (Forgery for the purpose of cheating)
- Section 66C & 66D of IT Act (Identity theft and cheating by personation through computer resources)
Cybercrime units across India are increasingly encountering such cases where dormant or legacy accounts are used as conduits for laundering or fraud.
The RBI has repeatedly instructed banks to:
- Re-verify identity documents before reactivating dormant accounts.
- Send alerts to original customers when mobile numbers or emails are changed.
- Introduce two-step verification for reactivation requests.
However, enforcement and compliance appear inconsistent, particularly in rural and semi-urban branches.
Learn more about RBI’s customer protection framework: RBI Customer Rights Charter.
🌐 4. The Broader Implications: When an MP Gets Defrauded
The symbolism of this case extends far beyond the amount involved. Kalyan Banerjee is not only a senior parliamentarian but also a legal professional and one of Bengal’s vocal political figures.
His experience exposes that no one is immune to cybercrime — even those with access to high-level systems and legal knowledge.
🧭 For the Banking Sector
This fraud puts renewed pressure on India’s banks to:
- Tighten KYC re-verification processes.
- Audit dormant accounts regularly.
- Improve transparency on cyber fraud redress.
👥 For Citizens
It also warns ordinary account-holders to:
- Regularly check old accounts.
- Ensure their mobile number and email IDs are current.
- Never share personal documents without verification.
- Immediately report any change in linked contact details.
Visit India’s official National Cyber Crime Reporting Portal to file complaints about financial or digital fraud.
🔍 5. Inside the Investigation: Kolkata Police Cyber Cell Steps In
Following Banerjee’s complaint, the Kolkata Police Cyber Crime Unit began an inquiry into how the fraudulent activation occurred. The primary focus is on:
- Identifying the origin of the forged KYC documents,
- Tracing the banking trail of the diverted funds,
- Locating the IP addresses and digital fingerprints used,
- Determining whether insider collusion at the bank was involved.
Preliminary findings indicate that the mobile number linked to the account had been altered, possibly with the help of manipulated verification data.
The cybercrime team is reportedly coordinating with RBI’s financial intelligence division and the Ministry of Electronics and Information Technology (MeitY) to track down the perpetrators.
📊 6. India’s Growing Cybercrime Challenge
The National Crime Records Bureau (NCRB) reported a 24% rise in cybercrime cases in India between 2023 and 2024, with most involving financial fraud, UPI scams, and KYC manipulation.
This aligns with the global trend where financial frauds via digital channels have overtaken traditional offline theft.
Experts from the Indian Computer Emergency Response Team (CERT-In) have emphasized that digital banking safety depends equally on bank infrastructure and public awareness.
Banerjee’s case, therefore, becomes a case study for cyber risk management in Indian banks.
💬 7. Kalyan Banerjee’s Response: A Call for Reform
In his press briefing, Banerjee expressed outrage not just at the theft but at the systemic weakness it revealed.
He said:
“The bank must answer how a dormant account was activated with forged documents. If such lapses can happen to a Member of Parliament, how safe are ordinary depositors?”
He urged the Union Finance Ministry and RBI to take up the issue urgently, demanding:
- Stronger penalties for banks that fail KYC verification,
- Mandatory alerts for dormant account reactivation, and
- Creation of a centralized fraud monitoring body under the Ministry of Finance.
🏛️ 8. Political and Public Reaction
The incident has generated wide political and public discussion.
- Within the Trinamool Congress, the episode has been framed as a cautionary tale about cyber vulnerability.
- Among opposition figures, it has reignited debate over digital privacy and cybercrime control mechanisms in India.
Social media users, meanwhile, have shared mixed reactions — some expressing sympathy, others demanding accountability from both the bank and regulatory authorities.
📉 9. Why Dormant Accounts Are a Cybercriminal’s Playground
According to the RBI, an account becomes dormant if there is no customer-initiated transaction for over 24 months. Once classified as dormant:
- It receives reduced scrutiny from monitoring systems.
- It may have old or outdated KYC details.
- Customers may forget about it entirely, leaving it unmonitored.
These conditions make dormant accounts attractive targets. In many cases, fraudsters use stolen identity data from leaks or the dark web to reactivate such accounts and launder money.
Cybersecurity experts recommend closing unused accounts or linking them to updated contact information to prevent such misuse.
For more on safe banking practices, check RBI’s Digital Banking Awareness Page.
💡 10. Lessons from the Kalyan Banerjee Bank Fraud 2025 Case
| Stakeholder | Key Takeaway |
|---|---|
| Banking Institutions | Implement real-time KYC verification with biometric cross-checks. |
| Regulators (RBI/Finance Ministry) | Mandate alerts and 2FA reactivation protocols for dormant accounts. |
| Customers | Periodically review all accounts, including those unused. |
| Law Enforcement | Strengthen inter-agency cybercrime coordination. |
| Government | Launch national awareness drives on financial cyber safety. |
This case should encourage banks to enhance their AI-based fraud detection systems and for the government to update the Information Technology Act to reflect modern cyber threats.
🌍 11. Broader Socio-Economic Relevance
The incident has sparked wider discussions on the digital divide in financial literacy. Millions of Indians are joining digital platforms under Digital India, yet few are fully aware of cyber hygiene practices.
If an experienced lawmaker and lawyer like Banerjee can fall victim, rural citizens and small entrepreneurs — who rely on mobile banking and UPI — are even more vulnerable.
Financial experts stress that banking inclusion must go hand in hand with cybersecurity education, especially in rural regions.
For awareness resources, visit the Ministry of Electronics & Information Technology.
🧩 12. Conclusion: A Wake-Up Call for Digital India
The Kalyan Banerjee Bank Fraud 2025 serves as a critical wake-up call for India’s digital financial landscape. It exposes how procedural lapses, weak document verification, and low vigilance can allow even dormant accounts to become instruments of large-scale fraud.
While the bank acted responsibly by crediting back the siphoned amount, the larger question remains unanswered: how did the fraud occur in the first place?
Until strict regulatory oversight and technological upgrades are uniformly implemented, citizens remain vulnerable to similar attacks.
Banerjee’s warning rings loud:
“What happened to me could happen to anyone.”
🔗 External Informational Links
- Reserve Bank of India – Cybersecurity and Fraud Prevention
- National Cyber Crime Reporting Portal
- Ministry of Electronics and Information Technology, Government of India
- CERT-In (Computer Emergency Response Team, India)
- RBI – Dormant Account Policy Guidelines
Also read: Home | Channel 6 Network – Latest News, Breaking Updates: Politics, Business, Tech & More

