Wednesday, July 24, 2024
EHA

Digital Strike!! India Banned 59 Chinese Apps Including TikTok, UC Browser, SHAREit

The government of India has taken a huge step against Chinese technology dominance in India and banned 59 Chinese made Apps including some of the most famous Chinese applications TikTok, UC Browser, Shareit, Virus Cleaner, UC News, ES File Explorer and more.

The steps have been taken to ensure national security and protect the privacy of billions of Indians and stop collecting sensitive data from the billion of mobile phones.

The ban has been imposed under Section 69A of the Information Technology Act that refers to Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009.

The Statement that issues by Indian Government said “in view of the emergent nature of threats has decided to block 59 apps since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order”

The statement from the Ministry of Electronics and IT said “The Ministry of Information Technology received a many complaints from various sources including misuse of the mobile apps available on Android and iOS platform for stealing and surreptitiously transmitting the users data in an authorized manner to servers which has location outside of India”

“The compilation of these data, its mining and profiling by elements hostile to national security and defence of India, which ultimately impinges upon the sovereignty and integrity of India, is a matter of very deep and immediate concern which requires emergency measures.” reads statement Ministry of Electronics & IT, India.

Most of the List apps are download more than 100 million times and some of the app Cam Scanner, TikTok, UC Browser,VidMate such as caught for lack of security and stealing sensitive data from users and generating huge revenue.

“On the basis of these and upon receiving of recent credible inputs that such Apps pose threat to sovereignty and integrity of India, the Government of India has decided to disallow the usage of certain Apps, used in both mobile and non-mobile Internet enabled devices,” stated in the “Press information Bureau, India”

The Indian Cyber Crime Coordination Centre, part of the Ministry of Home Affairs, has sent an “exhaustive recommendation for blocking the malicious apps that poses a national threat.

India already banned some of the above list apps such as Truecaller, WeChat, SHAREit and warned to all fields of Army and Paramilitary forces to delete specific apps that are created by Chinese companies or the one linking to Chinese servers.

Here’s the complete list of the apps banned:

1. TikTok
2. Shareit
3. Kwai
4. UC Browser
5. Baidu map
6. Shein
7. Clash of Kings
8. DU battery saver
9. Helo
10. Likee
11. YouCam makeup
12. Mi Community
13. CM Browers
14. Virus Cleaner
15. APUS Browser
16. ROMWE
17. Club Factory
18. Newsdog
19. Beutry Plus
20. WeChat
21. UC News
22. QQ Mail
23. Weibo
24. Xender
25. QQ Music
26. QQ Newsfeed
27. Bigo Live
28. SelfieCity
29. Mail Master
30. Parallel Space
31. Mi Video Call – Xiaomi
32. WeSync
33. ES File Explorer
34. Viva Video – QU Video Inc
35. Meitu
36. Vigo Video
37. New Video Status
38. DU Recorder
39. Vault- Hide
40. Cache Cleaner DU App studio
41. DU Cleaner
42. DU Browser
43. Hago Play With New Friends
44. Cam Scanner
45. Clean Master – Cheetah Mobile
46. Wonder Camera
47. Photo Wonder
48. QQ Player
49. We Meet
50. Sweet Selfie
51. Baidu 
52. Vmate
53. QQ International
54. QQ Security Center
55. QQ Launcher
56. U Video
57. V fly Status Video
58. Mobile Legends
59. DU Privacy

Also Stated in the Military ban report “Many Android/IOS apps developed by Chinese developers or having Chinese links are reportedly either spyware or other malicious ware. Use of these apps by our force personnel can be detrimental to data security having implications on the force and national security”

Spokespeople for ByteDance, the owners of TikTok and Helo, and Alibaba, which owns UC Browser, said they could not comment immediately.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles