Police Uncover Scam Involving Fake E-Traffic Fine SMS Blasts
The Directorate of Special Cyber Crimes (Dittipidsiber) of the Indonesian National Police (Polri) has uncovered a case of SMS blast phishing that resembles the official electronic traffic fine website, or e-tilang. This fraud was orchestrated by two Chinese nationals.
According to a report by detikcom on Thursday, February 26, 2026, the case began after the Attorney General’s Office (Kejagung) reported in December 2025 about the circulation of several fake links that impersonated government institutions. The police immediately launched an investigation.
National Police Chief General Listyo Sigit Prabowo, during a working meeting at Commission III of the DPR in Jakarta on January 26, revealed developments in the investigation. The Police Chief stated that suspects had been identified.
“One of the prominent cybercrimes is the handling of the SMS blast phishing case with the e-tilang modus operandi,” said the Police Chief.
Network of Chinese Nationals’ Syndicate
The Cybercrime Directorate of the Indonesian National Police then arrested five suspects in a case of online fraud or phishing using the SMS blast method for fake e-traffic fine payments. The Director of the Cybercrime Directorate of the Indonesian National Police, Brigadier General Himawan Bayu Aji, stated that the crime was controlled by Chinese nationals.
“Investigators conducted further investigation and examination of the five suspects and found that this crime was directly controlled by foreign nationals from China,” said Himawan in a press conference at the Indonesian National Police, South Jakarta, on Wednesday, February 25.
He mentioned that the suspects in Indonesia were only accomplices who received orders from the Chinese nationals. The perpetrators used Telegram accounts named Lee SK and Daisy Qiu.
“To support their operations in Indonesia, the perpetrators from China sent SIM boxes (devices used for blasting) directly to the suspects in Indonesia,” Himawan explained.
Himawan said that the Chinese nationals controlled the perpetrators in Indonesia to insert SIM cards into the SIM boxes or modem pools. The system was controlled remotely or automatically from China.
So, what is the role of the suspects in Indonesia?
The suspects in Indonesia opened the Terminal Vendor System or TVS application. Through this application, the suspects allegedly monitored the number of SMS blasts sent and failed.
“In one day, the SIM box devices operated by the suspects were able to send phishing SMS to 3,000 mobile phone numbers. To operate the SIM boxes sent from China, the perpetrators needed hundreds of SIM cards that had been registered using Indonesian citizens’ NIK (National Identity Number) and data,” he said.
A total of five people were arrested in this case. They are WTP (29), FN (41), RW (40), BAP (38), and RJ (29).
Two Chinese Nationals, Controllers of the Network, Being Hunted
The investigation of this case has not stopped. The Indonesian National Police is currently still hunting two Chinese nationals who control the online fraud syndicate with the SMS blast method for fake e-traffic fine payments.
“For these two Chinese controllers, we are investigating and we have obtained their identities, coordinating with the National Central Bureau of Interpol and Interpol,” said Brigadier General Himawan.
Both Chinese nationals used Telegram accounts with the names Lee SK and Daisy Qiu to communicate with the five suspects. The Police will soon issue red notices for both of them.
“We will issue red notices and we are also in intensive communication with China, because the sender’s address is listed there. We will ensure whether the address is correct or a fake address,” he explained.
The results of the Police’s investigation found that the two Chinese nationals had been to Indonesia and met with the suspects. The Chinese nationals also taught them how to operate the SIM box devices used for SMS blasts.
“The perpetrators from China sent SIM boxes, devices used for blasting, directly to the suspects in Indonesia,” said Himawan.
“Of the 7 SIM box units, two shipments in September and December 2025 were identified, and the rest are still being investigated,” he added.
In addition to hunting down the masterminds of the syndicate, the Police appealed to the public not to easily believe SMS messages sent from unknown numbers.
“The Police appeal to all members of the public not to easily believe SMS messages from unknown numbers that include links, especially those claiming to be from government agencies,” said Brigadier General Himawan.
Himawan asked the public to always check the authenticity of websites or sites first before entering personal data or banking data.
“If in doubt, immediately confirm with the bank’s customer service or the relevant agency,” said Himawan.
See also Video: E-Traffic Fine Fraud Suspects Paid in Cryptocurrency