Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/Threats/Attackers Use Fake RTO Challan Notifications for Android
Threats

Attackers Use Fake RTO Challan Notifications for Android

A sophisticated Android malware campaign targeting Indian users has emerged, disguising itself as legitimate Regional Transport Office (RTO) challan notifications. The malicious applications are...

Jennifer sherman
Jennifer sherman
February 5, 2026 3 Min Read
6 0

A sophisticated Android malware campaign targeting Indian users has emerged, disguising itself as legitimate Regional Transport Office (RTO) challan notifications.

The malicious applications are distributed outside the Google Play Store, primarily through WhatsApp and similar messaging platforms, exploiting user trust in government services.

Threat actors send fake traffic violation alerts to victims, instructing them to install an “E-Challan” or “RTO Challan” mobile application, which contains malware designed to steal financial and personal information.

This campaign represents a dangerous evolution in mobile threats, incorporating a three-stage modular architecture that enhances its ability to evade detection and maintain persistence on infected devices.

Unlike earlier variants that used single-stage APKs with hardcoded logic, this current operation employs dynamic remote configuration and extensive anti-analysis techniques.

The malware creates a custom VPN tunnel to mask its network activity, enabling covert data exfiltration while preventing security tools from detecting command-and-control communication.

Seqrite researchers identified the sophisticated social engineering tactics employed by attackers during their security analysis.

The malicious apps present fraudulent user interfaces mimicking official government portals, complete with RTO branding and logos, to convince users of their legitimacy.

Once installed, the malware prompts users to grant high-risk permissions including SMS access, call logs, notification listeners, and storage access, which enables comprehensive surveillance of the victim’s device.

The malware establishes persistent control by requesting users to disable battery optimization settings, allowing it to run continuously in the background without system restrictions.

Multi-Stage Infection Chain (Source - Seqrite)
Multi-Stage Infection Chain (Source – Seqrite)

This ensures the malicious application can operate uninterrupted and maintain an active connection to its command-and-control infrastructure.

The attack results in large-scale financial fraud, identity theft, and complete device compromise as the malware harvests banking notifications, OTP messages, and device metadata.

Infection Mechanism and Permissions Abuse

The infection process begins when victims receive SMS or WhatsApp messages containing shortened URLs that mimic legitimate e-Challan domains.

These messages create urgency by threatening license suspension, court summons, or legal proceedings for unpaid traffic fines.

When users click the link and install the APK file, the malware initiates its multi-stage deployment sequence.

First stage run (Source – Seqrite)

After installation, the third-stage application presents a fake government interface that prompts users to verify their identity or clear a pending challan.

To proceed, users must grant multiple dangerous permissions that grant the malware access to sensitive device functions.

Malware asking sensitive info 1 & 2 (Source - Seqrite)
Malware asking sensitive info 1 & 2 (Source – Seqrite)

Once these permissions are approved, the malware begins harvesting personal identity information, banking notifications, OTP messages, and device metadata.

The malware implements a foreground service deception technique, creating a fake notification that runs continuously while malicious activities occur in the background.

Users should verify traffic fines only through official government websites rather than clicking links in unsolicited messages.

Avoid downloading applications from sources outside the Google Play Store, and never grant unnecessary permissions to applications requesting access to SMS or notifications.

Organizations should implement mobile threat defense solutions and conduct security awareness training to help employees recognize social engineering tactics.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

WatchGuard VPN Client for Windows Vulnerability Enables Command

Next Post

Betterment Data Breach Exposes 1.4 Million Customer

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us