New Delhi : SINCE JANUARY 1, 2017, one person has died every five days, on an average, while cleaning sewers and septic tanks across the country, according to numbers collated by the National Commission for Safai Karamcharis (NCSK), the statutory body that was set up by an Act of Parliament for the welfare of sanitation workers.

The data, which is based mostly on newspaper reports and numbers supplied by a few state governments, is the first such official attempt to account for the deaths of sewer and septic tank cleaners.

According to NCSK, 123 people employed in hazardous forms of manual scavenging lost their lives while at work since January 2017. The last one week alone has seen a total of six deaths in the National Capital Region. Officials involved in the exercise admit, however, that even this number could be a gross under-estimation, considering the lack of data.

There are no numbers available on those employed in sewer and septic tank cleaning. All previous and ongoing exercises at compiling data have been restricted to accounting for those removing human excreta from dry latrines, open drains, and single pit toilets in villages.

The more hazardous forms involving the often fatal task of entering toxic sewerage systems, mainly in urban areas, have not been documented officially. This, despite the fact that the 1993 law outlawing manual scavenging in India was amended in 2013 to include sewer and septic tank cleaning.

Of the 28 states and seven union territories, the NCSK data has reported deaths from only 13 states and UTs.

“The death count is based on figures we could collate from a few states and mostly English and Hindi newspapers. There might have been several instances of similar stories in regional language papers which were weren’t able to account for,” said an official involved in the exercise.

This is evident in the reported instances which are high in in Haryana, Uttar Pradesh, Delhi, and Gujarat, in that order. On the other hand, the NCSK data shows Maharashtra as having had just two deaths in this period. As per the Socio-Economic Caste Census (SECC) 2011, rural Maharashtra alone has 65,181 households where at least one person is employed as a manual scavenger, the highest in the country, accounting for 35 per cent of the total 1.82 lakh such households in rural India.

SECC data doesn’t include urban India where sewer cleaning is more frequent. The state with the second highest number of manual scavenging in its villages — Madhya Pradesh at 23,105 as per SECC — doesn’t show any deaths in the NCSK data.

“We have repeatedly asked states to identity those involved in these jobs but the states deny the existence of manual scavenging as the practice is banned under law. As a result, in many cases, the families of the dead don’t even get the compensation,” said NCSK chairperson Manhar Valjibhai Zala.

As per NCSK data, the Rs 10 lakh compensation that is mandated under law in case of manual scavenging deaths, has been paid in only 70 of the 123 cases.

The paucity of data is evident in the count of people involved in manual scavenging, an exercise being carried out by an inter-ministerial task force led by the Ministry of Social Justice and Empowerment. The count is limited to only 170 districts in 18 states. Again, it excludes sewer cleaners entirely as well as any form of manual scavenging in urban areas.

The counting process was to be carried out by central government teams holding survey camps in districts where those engaged in manual scavenging could come forward for a self-declaration process. Following this, the states were to confirm the numbers identified.

While the exercise was to be over by June-end, officials confirmed that it has been significantly delayed as central government teams and state governments have so far acknowledged the existence of only 20,000 out of around 50,000 people identified.

Data obtained by The Indian Express shows that only 109 of the 170 districts have filed their response, and only 62 have identified at least one manual scavenger.

Bezwada Wilson, founder of Safai Karamchari Andolan (SKA), said that the central government has ignored repeated recommendations for extending the survey to include another 300 districts and sewer-septic tank cleaners. Wilson was part of the team that assisted the central government in carrying the recent survey in 170 districts.

“Their deaths are under-counted and so are their lives. Even the National Crime Records Bureau was agreeable to our suggestion that they should document the deaths separately. But nothing has happened on the front, either,” he said.

According to data and post-mortem reports maintained by the SKA, the actual death count since January 2017 is about 300.

“The Social Justice Ministry, which is in charge of this subject, mostly deals with the issue of compensation post deaths and rehabilitation of the handful identified as doing this job. Ministries such as Housing and Urban Affairs should be looking into the complete mechanisation of sewage cleaning, which is the only way to eliminate the practice of getting people to clean it manually. But they have never taken responsibility for the deaths,” Wilson said.

courtesy : indianexpress.com

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.

Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.

These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:

  • e-Challan apps
  • SBI KYC verification tools
  • PM Yojana portals
  • mParivahan clones
  • LPG booking apps
  • fake adult video call apps

As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.

Fear-Based Social Engineering Behind the Surge

According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.

Common bait messages include:

  • Your traffic challan has been issued
  • Your SBI KYC is pending
  • PM Yojana verification required
  • Your LPG cylinder booking failed
  • Your bank account will be blocked

These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.

One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.

How the Malware Takes Over Smartphones

Once installed, the malicious APK immediately requests dangerous permissions, including:

  • Accessibility access
  • SMS permissions
  • Call logs
  • Notifications
  • File storage
  • Battery optimization exemptions

Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:

  • read screen contents
  • detect banking and UPI apps
  • auto-click Allow / Confirm / Pay buttons
  • capture OTPs
  • launch hidden overlays
  • navigate banking sessions
  • trigger silent fund transfers

Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.

Within minutes, victims may lose control over:

  • bank balances
  • UPI wallets
  • Aadhaar and PAN scans
  • contact lists
  • personal photos and media
  • incoming calls
  • SMS OTPs

In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant

Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.

Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:

  • card number
  • expiry date
  • CVV
  • UPI PIN
  • net banking credentials
  • even ATM PINs

Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.

Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.

India’s Mobile Fraud Crisis Reaches Critical Levels

Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:

  • malicious APKs
  • phishing URLs
  • QR scams
  • RAT droppers
  • banking session hijacks
  • WhatsApp fraud chains

The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:

  • APK sideloading risks
  • dangerous permissions
  • fake banking overlays
  • accessibility abuse
  • WhatsApp APK scams

This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.

TraceX Guard Introduced as a Real-Time Defence Layer

In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.

The platform offers:

  • real-time APK scanning
  • malicious permission detection
  • hidden app discovery
  • RAT behaviour monitoring
  • QR & phishing URL safety grading
  • OTP and SIM fraud alerts
  • Wi-Fi hotspot verification
  • ransomware defence
  • India-specific scam intelligence feeds
  • support for 10+ regional languages

Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.

TraceX Labs says the system is specifically trained to detect patterns used in:

  • fake challan scams
  • counterfeit SBI APKs
  • PM Yojana malware
  • wedding invitation APK attacks
  • honey-trap adult apps
  • Telegram-based RAT droppers

From Phishing to Malware-Driven Financial Warfare

Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.

What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:

  • families
  • WhatsApp groups
  • banking accounts
  • local communities
  • social trust networks

With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.

In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.

Download Nowhttps://play.google.com/store/apps/details?id=com.tracexlabs.guard