Shahjahanpur (UP), Sep 20: BJP leader Swami Chinmayanand, accused of rape by a law student, was on Friday arrested and sent to 14 days' judicial custody, and has apparently told the police he was sorry for his behaviour.
But the Special Investigation Team (SIT) probing the case also arrested three other men - all charged with trying to extort money from the former Union minister, and named an unidentified woman as a suspect in the same case.
The student claimed the police are trying to weaken the case against the ruling party politician.
It was also not entirely clear if Chinmayanand had apologised for the alleged rape, or for getting the woman to massage him, which was recorded on video and shown to him during the investigation.
The charges against him were also unclear. While Uttar Pradesh police chief O P Singh said Chinmayanand was arrested in connection with rape, a press note issued by the SIT probing the case mentioned a lesser charge.
Instead of section 376 of the Indian Penal Code, which refers to rape, the SIT statement listed section 376C, which relates to coercive sexual intercourse by person in authority .
The section is usually applied in cases where a person abuses his position to "induce or seduce" a woman under his charge to have sexual intercourse not amounting to the offence of rape . The student studied at a college run by the 72-year-old leader's ashram.
If proved, a rape charge can lead to punishment of up to life imprisonment. Someone convicted under section 376C can be jailed for between five and 10 years.
Hours after the arrest, the student indicated that she is not satisfied with the charges under which Chinmayanand was arrested. It is an attempt to weaken the case against him, she told reporters.
The case is being investigated by an SIT formed by the Uttar Pradesh police on the directions of the Supreme Court. SIT chief Inspector General Naveen Arora said the video clipping of the accuser being made to massage Chinmayananda was also shown to him.
"When you have come to know everything, I have nothing to say. I accept my crime and I am very sorry for this act," the BJP leader was quoted as saying, according to the SIT chief.
But it was not clear if by crime he was referring to rape or the massage.
Singh, the Director General of Police, said Swami Chinmayanand was arrested in a case of rape.
The SIT team arrested him and conducted a medical examination. He was produced in court and sent to jail," he said.
According to Senior Prosecution Officer Kuldeep Singh, Chinmayanand has also been booked for stalking, wrongful confinement and criminal intimidation.
The student has alleged she was raped and physically exploited by Chinmayanand for a year.
She first mentioned harassment by Chinmayanand in a video clip uploaded on social media last month. On Monday, she recorded her statement before a magistrate.
"There was no delay as the SIT was minutely investigating the case. When the statement of the girl was recorded, she gave some video clippings. All the video clippings of the girl, and the videos related to extortion were sent for forensic examination. And after this only Swami Chinmayanand and three other persons were arrested," the DGP said.
The woman had submitted a pen drive containing 43 video clips to support her allegations.
Chinmayanand's counsel Pooja Singh said the SIT took signatures of his relatives on the arrest memo but no arrest-related documents were given to them.
Ahead of the arrest, security personnel were deployed in large numbers at Mumukshu ashram where members of the SIT reached in a convoy of over a dozen vehicles.
As Chinmayanand was taken for a medical check-up, patients were stopped from entering the government hospital.
Teams led by senior police officials were deployed on the court premises and at the hospital.
The SIT has also registered a case against Sanjay Singh, Sachin Sengar, Vikram alias Durgesh and an unnamed person (Ms A) under sections that relate to extortion, criminal evidence, and causing the disappearance of evidence.
"The SIT obtained digital mobile call detail records and footage from toll tax plazas and joined all the possible sequences to arrive at the conclusion, Arora said, referring to the period during which the woman had remained missing after uploading a video clip implicating Chinmayanand.
We came to know that the girl went from Shahjahanpur to Bareilly, then to Shimla and then to Delhi. After this, the girl was traced to Dausa (Rajasthan)."
"From January 1, 2019, the girl spoke to Sanjay almost 4,200 times, and she spoke to Chinmayanand nearly 200 times. Apart from this, the exchange of messages between the girl and Sanjay was also examined," he said.
"The probe is not complete yet, and it will continue. We have 90 days time. We do not want to leave any evidence in this case, and regular investigation of the case will continue."
The student had earlier threatened self-immolation if the police did not arrest the politician.
The SIT has questioned several witnesses, including the principals of the two colleges where the woman studied in recent years.
They also sought the records relating to the appointment of the woman's mother at one of the Chinmayanand-run colleges.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.
Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.
These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:
- e-Challan apps
- SBI KYC verification tools
- PM Yojana portals
- mParivahan clones
- LPG booking apps
- fake adult video call apps
As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.
Fear-Based Social Engineering Behind the Surge
According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.
Common bait messages include:
- Your traffic challan has been issued
- Your SBI KYC is pending
- PM Yojana verification required
- Your LPG cylinder booking failed
- Your bank account will be blocked
These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.
One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.
How the Malware Takes Over Smartphones
Once installed, the malicious APK immediately requests dangerous permissions, including:
- Accessibility access
- SMS permissions
- Call logs
- Notifications
- File storage
- Battery optimization exemptions
Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:
- read screen contents
- detect banking and UPI apps
- auto-click Allow / Confirm / Pay buttons
- capture OTPs
- launch hidden overlays
- navigate banking sessions
- trigger silent fund transfers
Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.
Within minutes, victims may lose control over:
- bank balances
- UPI wallets
- Aadhaar and PAN scans
- contact lists
- personal photos and media
- incoming calls
- SMS OTPs
In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant
Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.
Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:
- card number
- expiry date
- CVV
- UPI PIN
- net banking credentials
- even ATM PINs
Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.
Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.
India’s Mobile Fraud Crisis Reaches Critical Levels
Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:
- malicious APKs
- phishing URLs
- QR scams
- RAT droppers
- banking session hijacks
- WhatsApp fraud chains
The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:
- APK sideloading risks
- dangerous permissions
- fake banking overlays
- accessibility abuse
- WhatsApp APK scams
This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.
TraceX Guard Introduced as a Real-Time Defence Layer
In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.
The platform offers:
- real-time APK scanning
- malicious permission detection
- hidden app discovery
- RAT behaviour monitoring
- QR & phishing URL safety grading
- OTP and SIM fraud alerts
- Wi-Fi hotspot verification
- ransomware defence
- India-specific scam intelligence feeds
- support for 10+ regional languages
Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.
TraceX Labs says the system is specifically trained to detect patterns used in:
- fake challan scams
- counterfeit SBI APKs
- PM Yojana malware
- wedding invitation APK attacks
- honey-trap adult apps
- Telegram-based RAT droppers
From Phishing to Malware-Driven Financial Warfare
Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.
What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:
- families
- WhatsApp groups
- banking accounts
- local communities
- social trust networks
With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.
In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.
Download Now : https://play.google.com/store/apps/details?id=com.tracexlabs.guard
