logo
Over 25 mn devices at risk: What is FatBoyPanel, the new malware targeting Indian users?

Over 25 mn devices at risk: What is FatBoyPanel, the new malware targeting Indian users?

Indian Express25-04-2025

A dairy businessman, 44, from Dharashiv, received a WhatsApp call from someone posing as a bank official. The caller warned him that his account would be suspended unless updated immediately. When the victim panicked and asked how this issue could be resolved, the 'official' offered a simple solution – downloading a 'banking application,' the link of which would be shared on WhatsApp. The link reached him, and the victim downloaded the Android Package Kit (APK) file and installed it. What followed was 26 rapid transactions that drained his entire bank account.
A sophisticated, malicious piece of software, called malware, was the reason.
This isn't an isolated case. In recent years, scammers have increasingly targeted users through APK files laced with malicious software that hijack devices. This week, we take a closer look at one such malware: FatBoyPanel.
What is malware?
Malware, short for 'malicious software', refers to intrusive programs designed by cybercriminals to steal data or damage systems. Common types include viruses, worms, Trojans, spyware, adware, and ransomware.
Recently, in a blog post on the website of Zimperium, a tech company that provides AI-driven mobile security that protects devices and apps from phishing, malware, and zero-day threats, the company said that their research team has identified a malware that steals from the Indian bank accounts: FatBoyPanel.
What is FatBoyPanel?
Nico Chiaraviglio, chief scientist at Zimperium, told indianexpress.com that FatBoyPanel is a mobile-first banking trojan that has been discovered across nearly 900 different applications, primarily targeting Indian users.
The attack begins with social engineering: scammers pose as officials or trusted entities and approach users via WhatsApp. They then send a malicious APK, encouraging the user to install it.
Once installed, the app gains access to sensitive data and steals one-time passwords (OTPs) to execute unauthorised transactions.
'FatBoyPanel is mobile-first, optimised for Indian banking apps, and even supports real-time session hijacking. That makes it especially dangerous in the hands of low-skilled attackers,' said Akshat Khetan, a cyber-legal expert and founder of AU Corporate Advisory and Legal Services (AUCL).
What distinguishes this malware?
'It uses a centralised command structure that controls multiple variants across campaigns, abuses live phone numbers for OTP redirection, and has exfiltrated data from over 25 million devices. This makes it far more organised and dangerous than traditional banking trojans. It is also a new banker trojan that shows constant evolution of threat actors,' Chiaraviglio said.
The malware requests permission to read SMS messages, enabling it to capture OTPs and bypass two-factor authentication in real time. 'It hides its icon after installation and disables Google Play Protect, allowing it to stay hidden and maintain access,' Chiaraviglio said.
'Once permissions are granted, it embeds itself into the system and communicates with its control panel,' Khetan said,
Breach fueled by social engineering
The attackers pose as government agencies or trusted services, sending fake APKs via WhatsApp. This social engineering drives up installation rates,' Chiaraviglio said.
He also shared some numbers: Over 1,50,000 stolen messages were found on the attacker panel, with more than 25 million compromised device records, highlighting the massive scale of this breach. 'The breach exposes how easily users can be manipulated into side-loading apps and how SMS-based OTPs remain a weak link, especially in regions relying on them for banking authentication,' he said.
Pavan Karthick M, threat researcher III at CloudSEK, said, 'This campaign, active since late 2023, uses consistent infrastructure across all samples–FatBoyPanel. It's part of a growing trend where everyday platforms host Command and Control (C2) servers, giving cybercriminals both scalability and operational cover.'
Khetan elaborated on how the malware acts: 'Once deployed, the malware can intercept SMS-based OTPs, log credentials and perform keylogging. It may also use Accessibility Services to perform actions on behalf of the user such as initiating fund transfers within banking apps. In some cases, attackers use remote access tools (RATs) embedded in the payload to execute transactions manually from the victim's device, bypassing traditional fraud detection mechanisms.
How to protect yourself
– Avoid sideloading APKs: Only use official app stores.
– Enable Google Play Protect: Keep it on to scan for harmful apps.
– Use mobile security software: Opt for real-time threat detection.
– Verify app sources: Never trust unknown or unofficial links.
– Check app permissions: Avoid granting SMS, call, or gallery access to unverified apps.
Some malware can even delete itself to avoid detection, making user vigilance critical. 'To better protect users, banks must move away from SMS-based OTPs and embrace stronger multi-factor authentication. In-app protections and local-language awareness campaigns are also key,' Chiaraviglio said.
The Safe Side
As the world evolves, the digital landscape does too, bringing new opportunities—and new risks. Scammers are becoming more sophisticated, exploiting vulnerabilities to their advantage. In our special feature series, we delve into the latest cybercrime trends and provide practical tips to help you stay informed, secure, and vigilant online.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Study of money mules in Karnataka cybercrimes calls for regulation of cryptocurrency to check galloping crime rate
Study of money mules in Karnataka cybercrimes calls for regulation of cryptocurrency to check galloping crime rate

Indian Express

time33 minutes ago

  • Indian Express

Study of money mules in Karnataka cybercrimes calls for regulation of cryptocurrency to check galloping crime rate

The lack of regulation of the cryptocurrency market in India has been identified as being among the key factors in controlling money laundering linked to cyber crimes in the country by a 'Study on the Use of Money Mules in Cyber Crimes' conducted by the Centre for Cybercrime Investigation Training and Research of CID police in Karnataka. The combination of an unregulated cryptocurrency market and acceptance of cryptocurrency deposits by gaming platforms and casinos has made recovery of funds stolen in cybercrimes highly challenging, the study, which was unveiled at a conference of senior police officers in Bengaluru on Friday, has reported. Quoting data from the National Cyber Crime Reporting Portal (NCRP) for the year 2024, the study states that ₹2,915 crore was lost in 6.11 lakh cyber crimes in Karnataka – ₹1860 crore from private banks (3.02 lakh cases) and ₹948 crore from public banks (2.55 lakh cases). The losses caused by cyber crimes in Karnataka are reported to have increased fourfold in 2024 from ₹660 crore reported in 2023. The study has looked at the subject of money mules who knowingly or unknowingly facilitate the usage of bank accounts to facilitate the laundering and layering of money stolen from lakhs of innocent victims through scams like investment frauds, digital arrests etc, leading to the eventual transfer of the stolen funds to the operators of cybercrime networks through modes like cryptos or direct withdrawals. 'The unregulated cryptocurrency market is exacerbating the issue of money muling. Recent cases have revealed that laundered money is either converted into cryptocurrency using a money mule or transacted through P2P transactions with genuine crypto traders,' says the report authored by cybercrime police experts and the Data Security Council of India. The laundering of cybercrime proceeds through cryptos 'is further complicated by certain gaming platforms, such as casinos, that allow cryptocurrency deposits. Many cryptocurrency exchanges either do not require KYC or are based in foreign countries with lenient regulatory frameworks, both of which pose challenges for investigators,' says the study. The study has identified the tracking of the conversion of money stolen in cybercrime as 'a significant challenge for law enforcement agencies'. Apart from cash withdrawals at overseas ATMs using Indian debit cards in locations such as Dubai, Hong Kong, and Bangkok, as well as ATMs in remote areas across India, cryptocurrency conversions are seen as a key challenge. 'In many instances, illicit funds are converted into cryptocurrency through peer-to-peer (P2P) transfers on unregistered platforms and exchanges) changes). According to the CFCFRMS (Citizen Financial Cyber Fraud Reporting and Management System) platform, crypto valued at approximately ₹ 5.52 crores was transferred from March to May 2024 via the Bitget multi-exchange platform,' states the Karnataka study. 'In this process, criminals use mule accounts to funnel funds into international payment aggregators and global wallets such as Pypl from which the money is subsequently transferred to Binance,' states the report. The study has identified regulation of the cryptocurrency market as a key step in regulating the exploding rate of cyber crimes in states like Karnataka. 'There is a pressing need to regulate the cryptocurrency market in India. This regulation should not only require cryptocurrency exchanges to follow specific norms for collecting and verifying user details but also include penal provisions for money laundering and other illegal activities,' says the study on money mules in cyber crimes. In addition 'gaming and other platforms that receive direct cryptocurrency payments need to be regulated, requiring registration and mandatory KYC verification for customers. The government may consider banning non-compliant platforms and prohibiting Indian residents from transacting on cryptocurrency platforms not registered with the Government of India,' says the report. The study has also called for better monitoring of accounts by the banking sector to identify the creation and usage of mule accounts which tend to be dormant accounts or new accounts opened with fictitious details of identity and location. 'Cybercriminals are exploiting the online account opening facilities offered by numerous banks to open mule accounts using fake and nonlocal addresses. For instance, an individual located in Rajasthan may open an online account while providing a Bengaluru address. In one of the cases investigated at CID Bengaluru, up to 125 mule accounts have been opened in a private bank through online channels, where only basic KYC is required, and no physical verification is conducted by the banks,' states the study. Banks not flagging suspicious transactions While the RBI has mandated the generation of 'Suspicious Transaction Reports' to the centralised Financial Intelligence Unit India (FIU-IND) with warnings against non-compliance as part of efforts to regulate cyber crimes, banks tend to default on STRs, says the report. 'Investigations have revealed that banks sometimes fail to flag transactions as suspicious when large volumes occur. This failure is often attributed to negligence on the part of the banks, and in some rare cases, insiders in the bank colluding,' says the cybercrime report. Banks also tend to allow individuals to easily change the registered phone numbers on their bank accounts, and 'genuine accounts are sold to fraudsters who then link their phone numbers, enabling control over internet banking' even if the new mobile number does not match the one registered with Aadhaar. 'Despite the RBI mandates for strict due diligence on mobile number changes, this is not uniformly enforced across banks,' says the study. The study has pointed out that the RBI has also developed an in-house Artificial Intelligence/Machine Learning based solution called 'to detect suspected mule accounts'. 'Another factor aiding the proliferation of mule accounts is the ease with which fraudsters acquire mobile SIM cards. Cybercriminals procure SIMs using forged Aadhaar cards and other identities,' the study has reported. In terms of legal provisions the absence of punitive measures against money mules in the existing laws in the country has been a hindrance to regulating cybercrimes, says the report. 'As neither the Bharatiya Nyaya Sanhita (BNS), 2023 nor the Information Technology Act, 2000 contains sections solely and expressly dealing with money mules, individuals knowingly operating these accounts do not face criminal penalties in cybercrime cases specifically for being a money mule,' the report has stated. 'The entire gamut of cyber crime offences are occurring in the white economy of the country. The mechanisms introduced for financial inclusion like bank accounts and net banking are being misused for cyber crime. The cyber crimes involve the theft of white money through regular banking channels and not unknown networks,' a Karnataka cybercrime officer said.

Nissan Magnite gets offers of up to ₹86,000, celebrates 2 lakh sales
Nissan Magnite gets offers of up to ₹86,000, celebrates 2 lakh sales

Hindustan Times

time42 minutes ago

  • Hindustan Times

Nissan Magnite gets offers of up to ₹86,000, celebrates 2 lakh sales

Nissan Magnite competes with rivals like Maruti Suzuki Brezza, Tata Nexon, Kia Sonet, Hyundai Venue and Mahindra XUV 3XO. Check Offers Nissan Motor India has announced that it will be offering benefits of up to ₹ 86,000 with the Magnite. It is a celebratory offer as the compact SUV recently crossed the 2 lakh sales milestone in India. To know more information about the offer, the customers would need to visit the authorised dealerships, as they would be able to give out further details. Nissan Magnite CNG launched Nissan recently introduced the CNG-powered version of the Magnite in the Indian market. It is priced at ₹ 6.89 lakh ex-showroom. In contrast to numerous competitors that provide factory-installed CNG kits, the Magnite CNG features a dealer-level retrofit, indicating that the CNG kit is fitted at authorized centers after the vehicle has departed from the factory. This method presents customers with a more adaptable and economical option for transitioning to cleaner fuel, appealing to environmentally aware consumers. Dealer fitted CNG The CNG kit installed in the Magnite is designed, produced, and quality-checked by Motozen, an external supplier. It features a 12 kg single-cylinder configuration and is fitted at government-approved installation centers. Motozen offers warranty protection for the components of the CNG kit, while Nissan maintains its standard warranty of three years or 100,000 kilometers on the vehicle, even after the retrofit.: Also Read : Nissan India remains steadfast on commitments despite shift in global strategy What is the price of the retrofitment kit? The retrofit kit is available for ₹ 75,000 and is compatible with any variant of the 1.0-litre naturally aspirated petrol Magnite. The base petrol model is priced at ₹ 6.14 lakh, while the CNG variant starts at ₹ 6.89 lakh. This positions it as one of the most cost-effective CNG-equipped SUVs in India, particularly when compared to competitors that come with factory-installed kits. The Magnite is offered with a 1.0-litre naturally aspirated petrol and 1.0-litre turbocharged petrol engine options. Transmission choices include a manual, AMT and CVT. There is also now a CNG powertrain on offer. What are the features of the Nissan Magnite CNG? Although it is a more budget-friendly choice, the Magnite CNG still provides a well-appointed interior. It includes an 8-inch touchscreen infotainment system that supports wireless Android Auto and Apple CarPlay, a fully digital 7-inch instrument cluster, push-button start/stop functionality, USB Type-C ports, and automatic climate control. In terms of safety, it comes equipped with six airbags as standard, in addition to features such as Vehicle Dynamic Control, Electronic Stability Control, Traction Control, Hill Start Assist, a Tyre Pressure Monitoring System, ABS with EBD, Hydraulic Brake Assist, ISOFIX child seat anchors, and a high-speed alert system. What are the rivals of the Nissan Magnite CNG? In the Indian market, the Magnite CNG competes with competitors like the Maruti Suzuki Fronx CNG, Tata Punch iCNG, and Hyundai Exter CNG. Check out Upcoming Cars in India 2024, Best SUVs in India. First Published Date: 28 Jun 2025, 15:39 PM IST

Ahead of Phone 3 launch, Nothing reveals details of its India service centre network
Ahead of Phone 3 launch, Nothing reveals details of its India service centre network

India Today

time44 minutes ago

  • India Today

Ahead of Phone 3 launch, Nothing reveals details of its India service centre network

With Phone 3 and Headphone 1 launch on the horizon, Nothing plans to increase its service network footprint in India by 10 percent by the end of this year, its co-founder and country head, Akis Evangelidis, has announced. Akis revealed that the company currently has a network of over 330 service centres out of which five are a Nothing-exclusive. Moreover, the brand seems to be covering more ground each day in terms of customer satisfaction, delivering a fix or solution to their problems and concerns, quickly and efficiently. advertisementThe Nothing co-founder dropped by one of their exclusive service centres in Bangalore ahead of Phone 3 launch and claimed the support staff there was able to resolve '98 per cent of issues in under 2 hours,' entailing a customer satisfaction score of more than 97 percent. Additionally, he applauded the team working at this centre, saying, "Huge shoutout to the team for the hard work and appreciate the warm welcome. Indian hospitality never fails." His visit highlights the brand's commitment to building a solid reputation not just for sleek hardware and transparent design but also for dependable, user-centric support. India, being one of Nothing's key markets, is central to this push. Currently, Nothing operates over 330 service centres across India, with five exclusive centres strategically located in major metro cities — Bengaluru, Delhi, Mumbai, Hyderabad, and Chennai. In addition to these, the company runs 20 "priority desks" to offer faster service and reduced wait times for premium users and time-sensitive repairs. What's notable is that these aren't just token centres meant to tick a box. As per the stats shared, the Bengaluru facility is undoubtedly seeing significant footfall and handling cases with a rapid turnaround. But the brand isn't stopping there. With the launch of Phone 3, Nothing is gearing up to expand its service footprint even further. The goal is to increase customer care coverage by 10 per cent before the end of the year, which includes the addition of 10 new priority desks across India. 'We've been doubling down on customer care,' Akis said. "And while the numbers start to look good, we're not resting on our laurels. There's always room to improve and specific cases that can be handled better," he added. Nothing's approach seems to be resonating with the audience. The company has seen consistent growth in the Indian market, which is fast becoming its most important region globally. And with a user base that is increasingly vocal on social media, the emphasis on service quality could give the brand a clear competitive edge over legacy players that often outsource after-sales to third-party networks. As Phone 3 nears launch, all eyes will be on how Nothing translates this customer-first approach into the product itself, and whether it can keep pace with the rising expectations it has helped create. Phone 3 is set to launch globally, India included, on July 1.- EndsTune In

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store