Saturday, December 2, 2023

Home Ministry Warned Indian Army not to use Popular Chinese apps such as Truecaller, WeChat, SHAREit

Home ministry of India released a countrywide advisory to all fields of Army and Paramilitary forces to delete specific apps that are created by Chinese companies or the one linking to Chinese servers from their mobile phones.

The list of Apps consist of 42 application, and it includes some of the most famous apps such as TrueCaller, Weibo, WeChat, UC Browser, SHAREit, all officers are strictly advised to delete from their mobile phones immediately personal or official.

It is the first time that a red flag raised against Chinese apps, it was first reported by print and the instructions sent to troops on 24 November.

According to the Advisory report “As per reliable inputs, many Android/IOS apps developed by Chinese developers or having Chinese links are reportedly either spyware or other malicious ware. Use of these apps by our force personnel can be detrimental to data security having implications on the force and national security.”

Top Chinese apps on the List

1. TrueCaller
2. SHAREit
3. CM Browser
4. UC Browser
5. MI Store
6. UC News
7. WeChat
8. Weibo

Also Read Top Secret Data that Belongs to US Army and NSA leaked online

And if some of them are already using the app they are asked to delete the app immediately and to format the smartphone.You can find full of list of apps here.

IN 2010, the Union Home Ministry had mulled whether Chinese companies like Huawei and ZTE could be forbidden in India. Amongst the many gadgets supplied by these firms, the Home Ministry had flagged modems as being particularly vulnerable, Says Indiatoday.

Last month Mr. Rhee belonged to South Korea’s defense panel told that North Korean hackers stole a large data from South Korea military database, including wartime contingency plans jointly drawn by the United States and South Korea.

Data is a significant concern with growing number of cyber threats and data leaks, there are no reports, yet these apps are stealing data, but the security agencies have taken this step as tightening security measures.

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles