Seoul (AP/PTI): South Korea's previous defence minister was stopped from attempting suicide while in detention over last week's martial law, officials said, as police were reported to be raiding President Yoon Suk Yeol's office Wednesday in their intensifying investigation.

The main liberal opposition Democratic Party also plans to submit a new motion to impeach Yoon for his Dec. 3 declaration that imposed martial law.

Yoon's ill-conceived power grab has paralysed South Korean politics, frozen its foreign policy, and rattled financial markets, greatly reducing his chances of completing his five-year term and casting a turbulent shadow over one of Asia's most robust democracies.

Shin Yong Hae, commissioner general of of the Korea Correctional Service, told lawmakers Wednesday that Kim tried to kill himself at a detention centre in Seoul. He said that Kim's suicide attempt failed after centre officials stopped him and that he is in a stable condition now.

At the same parliament committee meeting, Justice Minister Park Sung Jae confirmed Kim's failed suicide attempt.

Kim was arrested earlier Wednesday after a Seoul court approved a warrant for him on allegations of playing a key role in a rebellion and committing abuse of power. Kim became the first person formally arrested over the Dec. 3 martial law decree.

Later in the day, National Police Agency Commissioner General Cho Ji Ho and Kim Bong-sik, head of the metropolitan police agency of the capital, Seoul, were detained over their actions during martial law. They are being investigated for their roles in deploying police forces to the National Assembly to block lawmakers from voting to lift Yoon's martial law decree.

South Korean police also searched Yoon's office Wednesday over his martial law decree, Yonhap news agency reported. Other South Korean media also carried similar reports. but Yoon's office and police have not immediately confirmed the search.

The country's main law enforcement institutions are focusing on finding whether Yoon and others involved in imposing martial law committed the crime of rebellion.

Yoon survived an impeachment attempt last Saturday when the ruling party boycotted the vote, but the Democratic Party is aiming to put the new motion to a vote on Saturday.

After last week's impeachment motion fell through, the leader of Yoon's conservative party pledged to arrange his stable exit from power, saying the party will coordinate with Cabinet members over state affairs and that Yoon will be sidelined from duties during a transition to an early election.

However, the plans have been widely criticized as unrealistic and unconstitutional. The constitution explicitly states that impeachment is the sole method for suspending presidential powers and that the authority to command the military rests solely with the president. The Defence Ministry said this week that Yoon remains in charge of the country's military forces.

The Assembly was also encircled by heavily armed troops, which military commanders say were deployed on the orders of the former defence minister. But enough lawmakers eventually managed to enter a parliament chamber and unanimously rejected Yoon's decree, forcing the Cabinet to lift it before daybreak on Dec. 4.

During a parliamentary hearing Tuesday, Kwak Jong-keun, commander of the Army Special Warfare Command whose troops were sent to parliament, testified that he received direct instructions from Kim Yong Hyun to obstruct lawmakers from entering the Assembly's main chamber. Kwak said the purpose of Kim's instructions was to prevent the 300-member parliament from gathering the 150 votes necessary to overturn Yoon's martial law order.

Kwak said Yoon later called him directly and asked for the troops to “quickly destroy the door and drag out the lawmakers who are inside.” Kwak said he discussed Yoon's order with the commander at the scene and that they concluded there was nothing that could be done, ruling out the possibility of threatening the lawmakers by shooting blanks or cutting off electricity.

At the same hearing, senior officer Kim Dae-woo of the military's counterintelligence agency said his commander, Yeo In-hyung, asked him if an army bunker in Seoul had space to detain politicians and other figures after martial law was imposed. Yeo is considered a close associate of Kim Yong Hyun. Last week, Hong Jang-won, a deputy director of the country's spy agency, said Yoon ordered him to help Yeo's command to detain some of his political rivals but he ignored the president's order.

Kwak and Yeo are among those who face opposition-raised rebellion charges along with Yoon and Kim, and the Defense Ministry suspended them last week.

If Yoon is impeached, his presidential powers would be suspended until the Constitutional Court decides whether to restore his powers or remove him from office. If he is dismissed from office, a new presidential election would be required.

Opposition parties and many experts say the martial law decree was unconstitutional. They say a president is by law allowed to declare martial law only during “wartime, war-like situations or other comparable national emergency states” and South Korea wasn't in such a situation. They argue that deploying troops to seal the National Assembly to suspend its political activities amounted to rebellion because the South Korean Constitution doesn't allow a president to use the military to suspend parliament in any situation.

In his martial law announcement, the conservative Yoon stressed a need to rebuild the country by eliminating “shameless North Korea followers and anti-state forces,” a reference to his liberal rivals who control parliament. Since taking office in 2022, Yoon has had near-constant friction with the main liberal opposition Democratic Party, which introduced motions to impeach some of his top officials and launched a political offensive over scandals involving Yoon and his wife.

On Wednesday, North Korea's state news agency for the first time reported about the political turmoil and street protests triggered by Yoon's martial law decree. The report mostly attempted to explain the South Korean events though it used its typical abusive language like calling Yoon “a traitor” and his military “gangsters.”

Many experts say North Korea is sensitive to the domestic spread of news on massive anti-government protests in foreign countries because its own people have no official access to international news and could be affected by such events.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.

Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.

These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:

  • e-Challan apps
  • SBI KYC verification tools
  • PM Yojana portals
  • mParivahan clones
  • LPG booking apps
  • fake adult video call apps

As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.

Fear-Based Social Engineering Behind the Surge

According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.

Common bait messages include:

  • Your traffic challan has been issued
  • Your SBI KYC is pending
  • PM Yojana verification required
  • Your LPG cylinder booking failed
  • Your bank account will be blocked

These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.

One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.

How the Malware Takes Over Smartphones

Once installed, the malicious APK immediately requests dangerous permissions, including:

  • Accessibility access
  • SMS permissions
  • Call logs
  • Notifications
  • File storage
  • Battery optimization exemptions

Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:

  • read screen contents
  • detect banking and UPI apps
  • auto-click Allow / Confirm / Pay buttons
  • capture OTPs
  • launch hidden overlays
  • navigate banking sessions
  • trigger silent fund transfers

Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.

Within minutes, victims may lose control over:

  • bank balances
  • UPI wallets
  • Aadhaar and PAN scans
  • contact lists
  • personal photos and media
  • incoming calls
  • SMS OTPs

In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant

Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.

Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:

  • card number
  • expiry date
  • CVV
  • UPI PIN
  • net banking credentials
  • even ATM PINs

Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.

Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.

India’s Mobile Fraud Crisis Reaches Critical Levels

Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:

  • malicious APKs
  • phishing URLs
  • QR scams
  • RAT droppers
  • banking session hijacks
  • WhatsApp fraud chains

The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:

  • APK sideloading risks
  • dangerous permissions
  • fake banking overlays
  • accessibility abuse
  • WhatsApp APK scams

This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.

TraceX Guard Introduced as a Real-Time Defence Layer

In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.

The platform offers:

  • real-time APK scanning
  • malicious permission detection
  • hidden app discovery
  • RAT behaviour monitoring
  • QR & phishing URL safety grading
  • OTP and SIM fraud alerts
  • Wi-Fi hotspot verification
  • ransomware defence
  • India-specific scam intelligence feeds
  • support for 10+ regional languages

Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.

TraceX Labs says the system is specifically trained to detect patterns used in:

  • fake challan scams
  • counterfeit SBI APKs
  • PM Yojana malware
  • wedding invitation APK attacks
  • honey-trap adult apps
  • Telegram-based RAT droppers

From Phishing to Malware-Driven Financial Warfare

Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.

What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:

  • families
  • WhatsApp groups
  • banking accounts
  • local communities
  • social trust networks

With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.

In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.

Download Nowhttps://play.google.com/store/apps/details?id=com.tracexlabs.guard