Seoul (AP): South Korea's parliament voted Saturday to impeach President Yoon Suk Yeol as authorities investigate allegations of rebellion over his controversial December 3 martial law decree that has caused huge political turmoil in the country.
The National Assembly passed the motion 204-85 in a floor vote. Yoon's presidential powers and duties will be suspended after the copies of a document on the impeachment are delivered to him and to the Constitutional Court.
The court has up to 180 days to determine whether to dismiss Yoon as president or restore his powers. If he's thrown out of office, a national election to choose his successor must be held within 60 days.
It was the second National Assembly vote on Yoon's impeachment motion. Last Saturday, Yoon survived an impeachment vote after most ruling party lawmakers boycotted the floor vote. Some People Power Party lawmakers had since announced their intentions to vote for Yoon's impeachment in a second vote, as public protests against Yoon intensified and his approval rating plummeted.
Tens of thousands of people have braved the bitter cold and poured onto the streets of the capital, Seoul, every night for the past two weeks, calling for Yoon's ouster and arrest.
They shouted slogans, sang, danced and waved K-pop light sticks. Smaller groups of Yoon's conservative supporters — still in the thousands — have also been rallying in Seoul, denouncing attempts to impeach the president. Both rallies have largely been peaceful.
Yoon's martial law imposition, the first of its kind in more than four decades in South Korea, lasted only six hours, but has caused massive political tumult, halted diplomatic activities and rattled financial markets. Yoon was forced to lift his decree after parliament unanimously voted to overturn it.
After declaring martial law, Yoon sent hundreds of troops and police officers to the parliament to try to impede its vote on the decree before they withdrew after the parliament rejected it. No major violence occurred.
Opposition parties and many experts accuse Yoon of rebellion, citing a law clause that categorizes as rebellion the staging of a riot against established state authorities to undermine the constitution. They also say that by law a president in South Korea is allowed to declare martial law only during wartime or similar emergencies and has no rights to suspend parliament's operations even under martial law.
The impeachment motion alleged that Yoon “committed rebellion that hurts peace on the Republic of Korea by staging a series of riots.”
It said Yoon's mobilisation of military and police forces threatened the National Assembly and the public and that his martial law decree was aimed at disturbing the Constitution.
In a fiery speech on Thursday, Yoon rejected the rebellion charges, calling his martial law order an act of governance.
The conservative Yoon said he aimed to issue a warning to the main liberal opposition Democratic Party, calling it “a monster” and “anti-state forces” that he argued has flexed its legislative muscle to impeach top officials and undermined the government's budget bill for next year.
“I will fight to the end to prevent the forces and criminal groups that have been responsible for paralysing the country's government and disrupting the nation's constitutional order from threatening the future of the Republic of Korea,” Yoon said.
Democratic Party leader Lee Jae-myung called Yoon's speech a “mad declaration of war” against his own people.
The Democratic Party and five other opposition parties control the 300-member unicameral parliament with a combined 192 seats, but they were eight seats shy of the two-thirds majority needed to pass Yoon's impeachment motion and needed support from ruling party lawmakers.
Yoon has been banned from leaving South Korea, as law enforcement authorities are investigating whether he and others involved in the martial law declaration committed rebellion, abuse of power and other crimes. If convicted, the leader of a rebellion plot can face the death penalty or life imprisonment.
Yoon has the presidential privilege of immunity from criminal prosecution but that doesn't extend to allegations of rebellion or treason. Subsequently, Yoon could be investigated, detained, arrested or indicted over his martial law decree, but many observers doubt that authorities will forcefully detain him because of the potential for clashes with his presidential security service.
Yoon's defence minister, police chief and the head of Seoul's metropolitan police agency have been arrested over their roles in the martial law case. Other senior military and government officials also face investigations.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.
Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.
These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:
- e-Challan apps
- SBI KYC verification tools
- PM Yojana portals
- mParivahan clones
- LPG booking apps
- fake adult video call apps
As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.
Fear-Based Social Engineering Behind the Surge
According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.
Common bait messages include:
- Your traffic challan has been issued
- Your SBI KYC is pending
- PM Yojana verification required
- Your LPG cylinder booking failed
- Your bank account will be blocked
These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.
One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.
How the Malware Takes Over Smartphones
Once installed, the malicious APK immediately requests dangerous permissions, including:
- Accessibility access
- SMS permissions
- Call logs
- Notifications
- File storage
- Battery optimization exemptions
Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:
- read screen contents
- detect banking and UPI apps
- auto-click Allow / Confirm / Pay buttons
- capture OTPs
- launch hidden overlays
- navigate banking sessions
- trigger silent fund transfers
Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.
Within minutes, victims may lose control over:
- bank balances
- UPI wallets
- Aadhaar and PAN scans
- contact lists
- personal photos and media
- incoming calls
- SMS OTPs
In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant
Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.
Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:
- card number
- expiry date
- CVV
- UPI PIN
- net banking credentials
- even ATM PINs
Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.
Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.
India’s Mobile Fraud Crisis Reaches Critical Levels
Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:
- malicious APKs
- phishing URLs
- QR scams
- RAT droppers
- banking session hijacks
- WhatsApp fraud chains
The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:
- APK sideloading risks
- dangerous permissions
- fake banking overlays
- accessibility abuse
- WhatsApp APK scams
This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.
TraceX Guard Introduced as a Real-Time Defence Layer
In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.
The platform offers:
- real-time APK scanning
- malicious permission detection
- hidden app discovery
- RAT behaviour monitoring
- QR & phishing URL safety grading
- OTP and SIM fraud alerts
- Wi-Fi hotspot verification
- ransomware defence
- India-specific scam intelligence feeds
- support for 10+ regional languages
Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.
TraceX Labs says the system is specifically trained to detect patterns used in:
- fake challan scams
- counterfeit SBI APKs
- PM Yojana malware
- wedding invitation APK attacks
- honey-trap adult apps
- Telegram-based RAT droppers
From Phishing to Malware-Driven Financial Warfare
Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.
What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:
- families
- WhatsApp groups
- banking accounts
- local communities
- social trust networks
With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.
In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.
Download Now : https://play.google.com/store/apps/details?id=com.tracexlabs.guard
