New Delhi: A bill to set up a 13-member body to regulate institutions of higher education was introduced in the Lok Sabha on Monday.

Union Education Minister Dharmendra Pradhan introduced the Viksit Bharat Shiksha Adhishthan Bill, which seeks to establish an overarching higher education commission along with three councils for regulation, accreditation, and ensuring academic standards for universities and higher education institutions in India.

Meanwhile, the move drew strong opposition, with members warning that it could weaken institutional autonomy and result in excessive centralisation of higher education in India.

The Viksit Bharat Shiksha Adhishthan Bill, 2025, earlier known as the Higher Education Council of India (HECI) Bill, has been introduced in line with the National Education Policy (NEP) 2020.

The proposed legislation seeks to merge three existing regulatory bodies, the University Grants Commission (UGC), the All India Council for Technical Education (AICTE), and the National Council for Teacher Education (NCTE), into a single unified body called the Viksit Bharat Shiksha Adhishthan.

At present, the UGC regulates non-technical higher education institutions, the AICTE oversees technical education, and the NCTE governs teacher education in India.

Under the proposed framework, the new commission will function through three separate councils responsible for regulation, accreditation, and the maintenance of academic standards across universities and higher education institutions in the country.

According to the Bill, the present challenges faced by higher educational institutions due to the multiplicity of regulators having non-harmonised regulatory approval protocols will be done away with.

The higher education commission, which will be headed by a chairperson appointed by the President of India, will cover all central universities and colleges under it, institutes of national importance functioning under the administrative purview of the Ministry of Education, including IITs, NITs, IISc, IISERs, IIMs, and IIITs.

At present, IITs and IIMs are not regulated by the University Grants Commission (UGC).

Government to refer bill to JPC; Oppn slams it

The government has expressed its willingness to refer it to a joint committee after several members of the Lok Sabha expressed strong opposition to the Bill, stating that they were not given time to study its provisions.

Responding to the opposition, Parliamentary Affairs Minister Kiren Rijiju said the government intends to refer the Bill to a Joint Parliamentary Committee (JPC) for detailed examination.

Congress Lok Sabha MP Manish Tewari warned that the Bill could result in “excessive centralisation” of higher education. He argued that the proposed law violates the constitutional division of legislative powers between the Union and the states.

According to him, the Bill goes beyond setting academic standards and intrudes into areas such as administration, affiliation, and the establishment and closure of university campuses. These matters, he said, fall under Entry 25 of the Concurrent List and Entry 32 of the State List, which cover the incorporation and regulation of state universities.

Tewari further stated that the Bill suffers from “excessive delegation of legislative power” to the proposed commission. He pointed out that crucial aspects such as accreditation frameworks, degree-granting powers, penalties, institutional autonomy, and even the supersession of institutions are left to be decided through rules, regulations, and executive directions. He argued that this amounts to a violation of established constitutional principles governing delegated legislation.

Under the Bill, the regulatory council will have the power to impose heavy penalties on higher education institutions for violating provisions of the Act or related rules. Penalties range from ₹10 lakh to ₹75 lakh for repeated violations, while establishing an institution without approval from the commission or the state government could attract a fine of up to ₹2 crore.

Concerns were also raised by members from southern states over the Hindi nomenclature of the Bill. N.K. Premachandran, an MP from the Revolutionary Socialist Party representing Kollam in Kerala, said even the name of the Bill was difficult to pronounce.

He pointed out that under Article 348 of the Constitution, the text of any Bill introduced in Parliament must be in English unless Parliament decides otherwise.

DMK MP T.M. Selvaganapathy also criticised the government for naming laws and schemes only in Hindi. He said the Constitution clearly mandates that the nomenclature of a Bill should be in English so that citizens across the country can understand its intent.

Congress MP S. Jothimani from Tamil Nadu’s Karur constituency described the Bill as another attempt to impose Hindi and termed it “an attack on federalism.”

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.

Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.

These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:

  • e-Challan apps
  • SBI KYC verification tools
  • PM Yojana portals
  • mParivahan clones
  • LPG booking apps
  • fake adult video call apps

As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.

Fear-Based Social Engineering Behind the Surge

According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.

Common bait messages include:

  • Your traffic challan has been issued
  • Your SBI KYC is pending
  • PM Yojana verification required
  • Your LPG cylinder booking failed
  • Your bank account will be blocked

These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.

One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.

How the Malware Takes Over Smartphones

Once installed, the malicious APK immediately requests dangerous permissions, including:

  • Accessibility access
  • SMS permissions
  • Call logs
  • Notifications
  • File storage
  • Battery optimization exemptions

Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:

  • read screen contents
  • detect banking and UPI apps
  • auto-click Allow / Confirm / Pay buttons
  • capture OTPs
  • launch hidden overlays
  • navigate banking sessions
  • trigger silent fund transfers

Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.

Within minutes, victims may lose control over:

  • bank balances
  • UPI wallets
  • Aadhaar and PAN scans
  • contact lists
  • personal photos and media
  • incoming calls
  • SMS OTPs

In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant

Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.

Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:

  • card number
  • expiry date
  • CVV
  • UPI PIN
  • net banking credentials
  • even ATM PINs

Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.

Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.

India’s Mobile Fraud Crisis Reaches Critical Levels

Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:

  • malicious APKs
  • phishing URLs
  • QR scams
  • RAT droppers
  • banking session hijacks
  • WhatsApp fraud chains

The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:

  • APK sideloading risks
  • dangerous permissions
  • fake banking overlays
  • accessibility abuse
  • WhatsApp APK scams

This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.

TraceX Guard Introduced as a Real-Time Defence Layer

In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.

The platform offers:

  • real-time APK scanning
  • malicious permission detection
  • hidden app discovery
  • RAT behaviour monitoring
  • QR & phishing URL safety grading
  • OTP and SIM fraud alerts
  • Wi-Fi hotspot verification
  • ransomware defence
  • India-specific scam intelligence feeds
  • support for 10+ regional languages

Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.

TraceX Labs says the system is specifically trained to detect patterns used in:

  • fake challan scams
  • counterfeit SBI APKs
  • PM Yojana malware
  • wedding invitation APK attacks
  • honey-trap adult apps
  • Telegram-based RAT droppers

From Phishing to Malware-Driven Financial Warfare

Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.

What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:

  • families
  • WhatsApp groups
  • banking accounts
  • local communities
  • social trust networks

With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.

In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.

Download Nowhttps://play.google.com/store/apps/details?id=com.tracexlabs.guard