Des Moines (US) (AP): A week after President-elect Donald Trump's victory, Elon Musk said his political action committee would “play a significant role in primaries.”

The following week, the billionaire responded to a report that he might fund challengers to GOP House members who don't support Trump's nominees. “How else? There is no other way,” Musk wrote on X, which he rebranded after purchasing Twitter and moving to boost conservative voices, including his own.

And during his recent visit to Capitol Hill, Musk and entrepreneur Vivek Ramaswamy delivered a warning to Republicans who don't go along with their plans to slash spending as part of Trump's proposed Department of Government Efficiency.

“Elon and Vivek talked about having a naughty list and a nice list for members of Congress and senators and how we vote and how we're spending the American people's money," said Rep. Marjorie Taylor Greene, R-Ga.

Trump's second term comes with the specter of the world's richest man serving as his political enforcer. Within Trump's team, there is a feeling that Musk not only supports Trump's agenda and Cabinet appointments, but is intent on seeing them through to the point of pressuring Republicans who may be less devout.

One Trump adviser, speaking on condition of anonymity to discuss internal political dynamics, noted Musk had come to enjoy his role on the campaign and that he clearly had the resources to stay involved.

The adviser and others noted that Musk's role is still taking shape. And Musk, once a supporter of President Barack Obama before moving to the right in recent years, is famously mercurial.

“I think he was really important for this election. Purchasing Twitter, truly making it a free speech platform, I think, was integral to this election, to the win that Donald Trump had,” said departing Republican National Committee co-chair Lara Trump, the president-elect's daughter-in-law. “But I don't know that ultimately he wants to be in politics. I think he considers himself to be someone on the outside.”

During the presidential campaign, Musk contributed roughly $200 million to America PAC, a super PAC aimed at reaching Trump voters online and in person in the seven most competitive states, which Trump swept. He also invested $20 million in a group called RBG PAC, which ran ads arguing Trump would not sign a national abortion ban even as the former president nominated three of the justices who overturned a federally guaranteed right to the procedure.

Musk's donation to RBG PAC — a name that invokes the initials of former Supreme Court Justice Ruth Bader Ginsburg, a champion of abortion rights — wasn't revealed until post-election campaign filings were made public Thursday.

Musk has said he hopes to keep America PAC funded and operating. Beyond that, he has used his X megaphone to suggest he is at least open to challenging less exuberant Trump supporters in Congress.

Another key Trump campaign ally has been more aggressive online. Conservative activist Charlie Kirk, whose group Turning Point Action also worked to turn out voters for Trump, named Republican senators he wants to target.

“This is not a joke, everybody. The funding is already being put together. Donors are calling like crazy. Primaries are going to be launched," Kirk said on his podcast, singling out Sens. Joni Ernst of Iowa, Jim Risch of Idaho, Mike Rounds of South Dakota and Thom Tillis of North Carolina as potential targets. All four Republican senators' seats are up in 2026.

For now, Musk has been enjoying the glow of his latest conquest, joining Trump for high-level meetings and galas at the soon-to-be president's Mar-a-Lago resort home in Palm Beach, Florida. The incoming administration is seeded with Musk allies, including venture capitalist and former PayPal executive David Sacks serving as the “White House AI & Crypto Czar” and Jared Isaacman, a tech billionaire who bought a series of spaceflights from Musk's SpaceX, named to lead NASA.

Musk could help reinforce Trump's agenda immediately, some GOP strategists said, by using America PAC to pressure key Republicans. Likewise, Musk could begin targeting moderate Democrats in pivotal states and districts this spring, urging them to break with their party on key issues, Republican strategist Chris Pack said.

“Instead of using his influence to twist GOP arms when you have majorities in both houses, he could start going after Democrats who vote against Trump's agenda in states where the election was a referendum for Trump,” said Pack, former communications director for the National Republican Senatorial Committee. “Otherwise, if you pressure Republicans with a primary, you can end up with a Republican who can't win, and then a Democrat in that seat.”

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.

Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.

These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:

  • e-Challan apps
  • SBI KYC verification tools
  • PM Yojana portals
  • mParivahan clones
  • LPG booking apps
  • fake adult video call apps

As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.

Fear-Based Social Engineering Behind the Surge

According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.

Common bait messages include:

  • Your traffic challan has been issued
  • Your SBI KYC is pending
  • PM Yojana verification required
  • Your LPG cylinder booking failed
  • Your bank account will be blocked

These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.

One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.

How the Malware Takes Over Smartphones

Once installed, the malicious APK immediately requests dangerous permissions, including:

  • Accessibility access
  • SMS permissions
  • Call logs
  • Notifications
  • File storage
  • Battery optimization exemptions

Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:

  • read screen contents
  • detect banking and UPI apps
  • auto-click Allow / Confirm / Pay buttons
  • capture OTPs
  • launch hidden overlays
  • navigate banking sessions
  • trigger silent fund transfers

Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.

Within minutes, victims may lose control over:

  • bank balances
  • UPI wallets
  • Aadhaar and PAN scans
  • contact lists
  • personal photos and media
  • incoming calls
  • SMS OTPs

In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant

Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.

Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:

  • card number
  • expiry date
  • CVV
  • UPI PIN
  • net banking credentials
  • even ATM PINs

Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.

Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.

India’s Mobile Fraud Crisis Reaches Critical Levels

Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:

  • malicious APKs
  • phishing URLs
  • QR scams
  • RAT droppers
  • banking session hijacks
  • WhatsApp fraud chains

The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:

  • APK sideloading risks
  • dangerous permissions
  • fake banking overlays
  • accessibility abuse
  • WhatsApp APK scams

This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.

TraceX Guard Introduced as a Real-Time Defence Layer

In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.

The platform offers:

  • real-time APK scanning
  • malicious permission detection
  • hidden app discovery
  • RAT behaviour monitoring
  • QR & phishing URL safety grading
  • OTP and SIM fraud alerts
  • Wi-Fi hotspot verification
  • ransomware defence
  • India-specific scam intelligence feeds
  • support for 10+ regional languages

Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.

TraceX Labs says the system is specifically trained to detect patterns used in:

  • fake challan scams
  • counterfeit SBI APKs
  • PM Yojana malware
  • wedding invitation APK attacks
  • honey-trap adult apps
  • Telegram-based RAT droppers

From Phishing to Malware-Driven Financial Warfare

Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.

What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:

  • families
  • WhatsApp groups
  • banking accounts
  • local communities
  • social trust networks

With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.

In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.

Download Nowhttps://play.google.com/store/apps/details?id=com.tracexlabs.guard