Belagavi (PTI): Belagavi district with second highest number of assembly seats after Bengaluru Urban -- is expected to witness tough contest between the BJP and Congress as Lingayat politics surmounts the local issues, but the Maharashtra Ekikaran Samiti (MES) could play spoilsport in a few seats as it wants to keep the border issue alive.

There are 18 assembly constituencies in the border district which is a Lingayat stronghold and has been a BJP bastion in the last two decades.

As in the last three elections, it is likely to be a straight contest between the BJP and Congress in most of the assembly seats barring five where the Shiv Sena-NCP supported MES -- a vocal proponent of the inclusion of Belagavi and other Marathi-speaking areas in Maharashtra -- has fielded local candidates.

The leadership vacuum in the Lingayat community after sidelining of stalwart leader B S Yediyurappa, demise of some prominent local Lingayat BJP leaders like Suresh Angadi and Umesh Katti and rising clout of politically influencial Jarkiholi family belonging to scheduled tribes community -- are expected to resonate among voters.

The exit of many disgruntled BJP leaders including three-time MLA and former Deputy Chief Minister Laxman Savadi from Belagavi, over denial of the ticket for the upcoming assembly election -- is likely to dent some votes here.

On the other hand, MES is trying hard to keep the border issue alive in Belagavi, which was part of the erstwhile Bombay Presidency and constitutes nearly 40 per cent Marathi-speaking population. The triangular fight could dent votes of national parties in five Marathi-speaking dominated constituencies.

Five of the constituencies in the district are dominated by Marathas, while Lingayats form a majority in most of the 13 remaining constituencies. There is a sizable population of OBCs and SCs/STs as well, with two seats reserved for these groups in the district.

In the district, where many elected representatives are sugar barons, three powerful political families -- the Jharkiholis, the Jolles and the Khattis -- enjoy electoral dominance.

From the Jharkiholi family, Ramesh Jarkiholi and Balachandra Jarkiholi are contesting on a BJP ticket from Gokak and Arabhavi assembly constituencies, respectively. Another member of the family, Satish Jarkihol is contesting on a Congress ticket from theYemkanmardi seat.

The Jarkiholi brothers are known to change parties. Ramesh Jarkiholi was a minister in the Congress-JD(S) coalition government before joining the BJP ranks. He was among the 17 MLAs who defected from the Congress and helped BJP to topple the Congress-JDS coalition government in 2019.

Ramesh's clout in the district is hard to ignore as he has ensured BJP ticket to his followers who defected from Congress, which has upset the traditional party leaders especially his political rival Laxman Savadi

Another prominent family are Jolles represented by the incumbent Muzrai (Religious and Charitable Endowments) minister Shashikala Jolle who is contesting on BJP ticket from Nippani constituency. Her husband Anna Saheb Jolle is the BJP Lok Sabha member from Chikkodi in Belagavi district.

From the Khatti family, Ramesh Khatti -- who represented the Chikkodi parliamentary constituency from 2009-2014 -- is contesting on a BJP ticket from the Chikkodi-Sadalga MLA seat this time, while his nephew Nikil Katti from Hukkeri assembly constituency after untimely demise of his father Umesh Khatti, who was an eight time MLA and six time minister.

After quitting BJP over denial of a ticket, Laxman Savadi is contesting on a Congress ticket from the Athani assembly seat to avenge his humiliation from the saffron party, especially Ramesh Jarkiholi. He has to face Mahesh Kumathalli, then in the Congress, now the BJP nominee

Ramesh has differences with some Congress leaders like Laxmi Hebbalkar who is contesting from Belagavi Rural seat. Both of them are contesting from different constituencies but are trying hard to defeat each other to settle personal grudges.

There are 39.01 lakh voters in the 18 assembly constituencies of Belagavi district. Out of which, 19,68,928 are male voters, 19,32,576 women and 141 registered as Others, as per the official data.

In the 2018 polls, the BJP won 10 and Congress 8 seats, which changed after the defections in 2019. Three Congress MLAs Ramesh Jarkiholi (Gokak), Mahesh Kumathalli (Athani) and Shrimanth Patil (Kagwad) resigned and joined the BJP.

All the latest news from Karnataka, just one click away. CLICK here to read all the important news from Karnataka in a single click.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.

Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.

These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:

  • e-Challan apps
  • SBI KYC verification tools
  • PM Yojana portals
  • mParivahan clones
  • LPG booking apps
  • fake adult video call apps

As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.

Fear-Based Social Engineering Behind the Surge

According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.

Common bait messages include:

  • Your traffic challan has been issued
  • Your SBI KYC is pending
  • PM Yojana verification required
  • Your LPG cylinder booking failed
  • Your bank account will be blocked

These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.

One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.

How the Malware Takes Over Smartphones

Once installed, the malicious APK immediately requests dangerous permissions, including:

  • Accessibility access
  • SMS permissions
  • Call logs
  • Notifications
  • File storage
  • Battery optimization exemptions

Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:

  • read screen contents
  • detect banking and UPI apps
  • auto-click Allow / Confirm / Pay buttons
  • capture OTPs
  • launch hidden overlays
  • navigate banking sessions
  • trigger silent fund transfers

Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.

Within minutes, victims may lose control over:

  • bank balances
  • UPI wallets
  • Aadhaar and PAN scans
  • contact lists
  • personal photos and media
  • incoming calls
  • SMS OTPs

In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant

Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.

Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:

  • card number
  • expiry date
  • CVV
  • UPI PIN
  • net banking credentials
  • even ATM PINs

Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.

Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.

India’s Mobile Fraud Crisis Reaches Critical Levels

Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:

  • malicious APKs
  • phishing URLs
  • QR scams
  • RAT droppers
  • banking session hijacks
  • WhatsApp fraud chains

The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:

  • APK sideloading risks
  • dangerous permissions
  • fake banking overlays
  • accessibility abuse
  • WhatsApp APK scams

This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.

TraceX Guard Introduced as a Real-Time Defence Layer

In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.

The platform offers:

  • real-time APK scanning
  • malicious permission detection
  • hidden app discovery
  • RAT behaviour monitoring
  • QR & phishing URL safety grading
  • OTP and SIM fraud alerts
  • Wi-Fi hotspot verification
  • ransomware defence
  • India-specific scam intelligence feeds
  • support for 10+ regional languages

Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.

TraceX Labs says the system is specifically trained to detect patterns used in:

  • fake challan scams
  • counterfeit SBI APKs
  • PM Yojana malware
  • wedding invitation APK attacks
  • honey-trap adult apps
  • Telegram-based RAT droppers

From Phishing to Malware-Driven Financial Warfare

Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.

What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:

  • families
  • WhatsApp groups
  • banking accounts
  • local communities
  • social trust networks

With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.

In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.

Download Nowhttps://play.google.com/store/apps/details?id=com.tracexlabs.guard