How arrested ‘ISI spy’ targeted Indian defence personnel using malware & a school fee loophole
Military Intelligence (MI) officials in India detected a campaign by a Pakistani operative who compromised Android phones of defence personnel through a malicious WhatsApp campaign, “Har Ghar Tiranga”. The scam sent targets a malicious application link, claiming to be from Army Public Schools. The officials traced the last use of the contact number to Gujarat. With technical analysis, Gujarat Police Anti-Terrorism Squad (ATS) identified Labhsankar Maheshwari as the prime suspect for assisting ISI’s acquisition of the Indian number.
Source: theprint.in
- Read more