Gandhinagar, April 20: Three persons, including the main perpetrator, involved in the rape and murder of a nine-year-old girl in Surat have been arrested, the Gujarat government said on Friday.
Minister of State for Home Pradeepsinh Jadeja told the media here that Gujarat Police arrested the key perpetrator from a village in Ganganagar district of Rajasthan, who will be brought to Gujarat.
Earlier in the day, Chief Minister Vijay Rupani said that Surat Police had arrested three persons in the case. All accused are believed to be originally from Rajasthan.
Police had found the body of the girl with over 86 injuries dumped in the bushes near Jeeav Road in Pandesara area of Surat on April 6. An autopsy revealed that she was brutally raped and tortured for days before her murder.
A case of rape was registered under the Protection of Children from Sexual Offences Act.
The Minister said that over 400 personnel of Surat police and Ahmedabad Crime Branch worked on the case.
Police analysed the mobile data and CCTV footage from a 3-km radius of the spot from where the body was found. The case was finally cracked after police zeroed in on CCTV footage of a black car moving suspiciously in the area.
Earlier, police suspected that the girl hailed from either Odisha, West Bengal or Jharkhand. An Andhra Pradesh man had come forward to claim the girl was his daughter. Surat police even carried out a DNA test to verify his claim.
"On April 9, a woman's decomposed body was found lying a few km from the spot where the girl was found dead. We believe she is the girl's mother. We will carry out a DNA test," Jadeja said.
"We will appoint a special public prosecutor to pursue the case in a fast-track court," Jadeja said.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
Bengaluru: A major data breach has exposed the personal information of more than 2.9 lakh users of the Bangalore Water Supply and Sewerage Board (BWSSB), according to a recent probe conducted by the Bengaluru-based cybersecurity firm CloudSEK.
The breach involved unauthorised access to BWSSB's water connection application portal, exposing sensitive user data including Aadhaar numbers, PAN details, mobile numbers, full addresses, email IDs, and payment records, the probe report revealed, as cited by Deccan Herald on Tuesday.
The compromised database was reportedly listed for sale on BreachForum, an underground data leaks web forum, by a threat actor with the username pirates_gold.
"The initial post by the threat actor specified a payable amount of $500 (approximately Rs 42,616) for access to the compromised BWSSB database. However, upon direct engagement, the actor demonstrated high level of urgency and appeared willing to negotiate significantly lower prices, indicating a potential desperation to sell," CloudSEK noted in its findings, which were shared with both the BWSSB chairman and the Officer on Special Duty to Chief Minister Siddaramaiah.
"The post claimed that the database access would expose records of 2,91,212 users. It was explicitly stated that the compromised data did not include the user's passwords. Additionally, the post featured a few lines of sample data,” said the report, as cited by DH.
The leaked dataset reportedly contained multiple categories of information, including payment data, grievance data, application data, and system logs. The application data alone is said to contain over 2.91 lakh records, featuring full names, complete addresses, contact details, Aadhaar, and PAN numbers—details which could potentially be exploited for identity theft or financial fraud.
Despite the serious nature of the breach, sources in the BWSSB assured that the data was safe. "The entire billing data is stored in the Data Centre maintained by the Karnataka government. The 24x7 monitoring is at a high-security level and a breach of billing data was next to impossible,” DH quoted BWSSB sources as saying.
Meanwhile, BWSSB Chairman Ram Prasath Manohar acknowledged the report and stated that adequate measures would follow, noting that a case would be filed with the cybercrime police. “If a breach has indeed occurred, we will identify the root cause and involve technical experts to bolster our data security systems,” DH quoted Manohar as saying.
As part of its findings, CloudSEK recommended immediate corrective measures, including conducting a comprehensive security audit, revoking any exposed or potentially compromised credentials, and removing public access to administrative interfaces to prevent future breaches.