
Cambridge Institute of Technology (CIT) | Image Credit: Official website of the CIT
Cambridge Institute of Technology duped of ₹14 lakh in project funding scam using IIT Chennai name
Bengaluru
Cambridge Institute of Technology has fallen prey to a sophisticated scam, losing ₹14 lakh after cyber fraudsters falsely claimed to offer project funding through IIT Chennai. An First Information Report (FIR) is registered at Whitefield CEN police station based on a complaint. The incident occurred in the first week of June.
According to the FIR, an advisor of the Cambridge Institute identified as K B N Murthy was contacted on June 7, 2025, by an unknown individual identifying himself as S. Kilaru (Phone: 7702092906). The caller falsely claimed to be Prof. Madhu Mudyam from IIT Chennai lured Murthy on the pretext of project funding.
He promised access to a research project fund, supposedly available through IIT channels, and told the institute that they would need to make an initial deposit to avail it. The complaint was filed by V Brahmanandam, an account officer of the college.
Believing the offer to be legitimate, the college administration approved the transaction. On June 9, 2025, a total of ₹14,00,000 was transferred via RTGS from the institute’s HDFC Bank account (A/C No. xxxxxxxxx608748) to the accused’s Canara Bank account (A/C No. xxxxxxx9410).
Only later did the institute realise it had been defrauded by impostors misusing the name of a reputed IIT professor and institution. The money was taken under the pretext of offering fake project funding.
A case has been registered at Whitefield police station under Crime No. 410/2025, invoking Sections 66(C) and 66(D) of the IT Act and Sections 318(4) and 319(2) of the Bharatiya Nyaya Sanhita (BNS). Police are now investigating the matter, and efforts are on to trace the accused and recover the siphoned amount.
Authorities have warned other educational institutions to stay alert and verify all funding offers before making payments.
For more Bengaluru news developments click here