
In a shocking security breach, Vishal Yadav, a clerk at the Indian Navy headquarters in Delhi, was arrested on June 25, 2025, for allegedly leaking sensitive details about Operation Sindoor to a Pakistani intelligence operative. The operation, a series of strikes targeting terror camps in Pakistan and Pakistan-occupied Kashmir, was India’s response to the April 22, 2025, Pahalgam terror attack that killed 26 people. Yadav, lured by money and a fake online identity, reportedly shared classified naval data with a woman posing as “Priya Sharma.” This incident has raised alarms about espionage and digital vulnerabilities in India’s defense system. With investigations ongoing and new details emerging, this article explores the case, its implications, and live updates on the situation.
The Arrest of Vishal Yadav
Vishal Yadav, an Upper Division Clerk at the Navy’s Directorate of Dockyard in Delhi, was nabbed by Rajasthan Police’s intelligence wing after months of surveillance. Hailing from Punsika village in Haryana’s Rewari, Yadav allegedly shared critical defense information, including Operation Sindoor details, with a Pakistani handler. The arrest, made under the Official Secrets Act, 1923, followed evidence from his phone showing encrypted chats and financial transactions. Inspector General of Police Vishnukant Gupta said Yadav confessed to receiving around ₹2 lakh, including ₹50,000 specifically for Operation Sindoor secrets. The case has sparked a joint probe by multiple agencies to uncover the full extent of the leak and any accomplices.
How the Leak Was Uncovered
Suspicion arose during a review of social media accounts linked to a 2022 espionage case involving a Sena Bhawan staffer. Yadav’s interactions with “Priya Sharma” on Facebook, WhatsApp, and Telegram raised red flags. Forensic analysis revealed he shared sensitive files, prompting his detention in Jaipur for interrogation.
Yadav’s Motive and Vulnerability
Yadav’s addiction to online gaming reportedly left him in debt, making him an easy target. The Pakistani handler exploited this, offering small payments of ₹5,000–₹6,000 for minor details before escalating to larger sums for critical data. Payments via cryptocurrency and bank transfers further concealed the transactions.
Operation Sindoor: A High-Stakes Mission
Operation Sindoor was India’s bold military response to the Pahalgam terror attack, launched on May 7, 2025. Over four days, the Indian Armed Forces struck nine terror camps in Pakistan and PoK, killing over 100 terrorists. The operation involved drones, missiles, and long-range weapons, ending with a ceasefire on May 10. Yadav’s leak of operational details could have compromised strategic plans, raising serious concerns about national security. The incident highlights the challenges of securing sensitive information during high-stakes missions, especially as foreign agencies use sophisticated tactics to exploit vulnerabilities. Authorities are now racing to assess the damage and strengthen defenses.
What Was Operation Sindoor?
Launched after the Pahalgam attack, Operation Sindoor targeted terror hubs across the border. It showcased India’s zero-tolerance policy on terrorism, with Prime Minister Modi emphasizing its global impact. The operation’s success relied on secrecy, making Yadav’s alleged leak particularly damaging.
Why the Leak Matters
Leaking Operation Sindoor details could have exposed military strategies, troop movements, or technology used, potentially aiding adversaries. The breach underscores the need for stricter digital security and background checks for personnel handling classified data, as espionage risks grow in the digital age.
The Pakistani Handler and Espionage Tactics
The Pakistani operative, posing as “Priya Sharma,” contacted Yadav via Facebook, later moving to WhatsApp and Telegram for encrypted communication. This “honey trap” tactic, where spies use fake identities to build trust, is increasingly common. Yadav received payments through cryptocurrency (USDT) and direct bank transfers, totaling ₹2 lakh. This case is part of a broader crackdown on Pakistani espionage, with recent arrests of others, like Shakur Khan in Jaisalmer, showing how foreign agencies exploit personal weaknesses. Authorities warn that Pakistan’s intelligence is using advanced methods to target Indian defense personnel.
How the Handler Operated
The handler, posing as an Indian woman, built a relationship with Yadav over months. Starting with small payments for low-level info, she gradually pushed for high-value secrets. The use of Telegram’s encryption made tracking harder, but surveillance eventually exposed the link.
Broader Espionage Concerns
This isn’t the first case of Pakistani spies targeting Indian defense staff. A 2022 case involving a Sena Bhawan employee and recent arrests of influencers like Jyoti Malhotra show a pattern. These incidents highlight the growing threat of digital espionage, especially via social media.
What’s Next for the Investigation
The joint task force is tracing Yadav’s financial transactions, especially cryptocurrency payments, to uncover the handler’s network. Authorities are also increasing surveillance on social media platforms to catch similar espionage attempts, aiming to safeguard India’s defense secrets.