Holywood News

Hyderabad police alerted cyber scams themed on Indian Parker conflict

Amid escalating tensions between India and Pakistan, the Hyderabad Police Department’s cybercrime wing warned the public to publicly introduce phishing links and APK files as war-related news updates were disguised. Police said the cyber attacks target Indian government agencies, military personnel and critical infrastructure to gain access to unauthorized sensitive information.

According to police, the attackers are spreading fake content – videos, images, APKs and .EXE files through WhatsApp, Telegram and other social media platforms, as well as emails. These files usually appear in outbreaks of news, leaked war footage or emergency updates, but contain malware designed to steal personal data, hacker banks and social media accounts.

The malware has been embedded in files called “Hillary Dance”, “Army_JOB_APPLICATION_FORM.PDF” and “Tasksche.exe”, while the forged APK file is marked “Real-Time War Update”.

After downloading, these programs can harm equipment and mine sensitive information, some of which are designed to mimic the official government portal to extract the login certificate.

Police warn users not to open or forward suspicious files even if shared through trusted contacts. Ask users to avoid downloading informal applications or clicking forward links.

Citizens are required to disable automatic media downloads in WhatsApp, turn on two-step verification, and report suspicious content immediately – report to WhatsApp directly or through the National Cybercrime Reporting Portal (www.cybercrime.gov.in). Email users are advised not to click unknown attachments, be aware of fake email IDs and always double check the source before reacting.

Now, as cyber hygiene is as crucial as physical security, police have advised people to stick to verified news media, update antivirus software, back up critical data, and verify all forwarded information before sharing.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button