Gangavathi (PTI): His outfit may be taking baby steps in Karnataka's political arena dominated by BJP, Congress and the JD(S) but mining baron Gali Janardhana Reddy is confident his newly floated party will grow big enough by 2028 to catapult him to the ruling saddle, as he tests the waters with the electoral debut of his Kalyana Rajya Pragati Paksha in the ensuing elections to the state Legislative Assembly.
A former BJP minister, Janardhana Reddy, who had severed ties with the saffron party and floated KRPP in December last year, said he has not launched it with the objective of becoming CM right away in 2023.
"I am patient. We will build a solid foundation in 2023 and by 2028 we will come to power on our own strength, with a thumping majority," he said.
When asked if he aimed for Chief Minister's post, Reddy said "aiming for CM's post--that's not the thing (now). But, when I floated the party...you can understand. But, yes my target is 2028 elections, and Kalyana Rajya Pragati Paksha will form the government in Karnataka on its own then," Reddy told PTI.
Janardhana Reddy, asked on the reason for floating KRPP, said public have confidence in him because "they know whatever I commit, I will fulfill it."
"Earlier I had worked for BJP. How I served the people they know very well. So based on that today public have lots of expectations from me. So, I have started my own party", Janardhana Reddy said, amid the hectic ongoing election campaigning.
Karnataka votes on May 10, with the results slated to be declared on May 13.
He said the KRPP is contesting in 47 constituencies and "our target is that we will win in at least 25 seats".
Janardhana Reddy, who is re-entering Karnataka's electoral politics from outside Ballari district, is contesting the upcoming Assembly polls from Gangavathi in Koppal district. He exuded confidence that he is going to win by thumping majority from Gangavathi.
He has been barred by the Supreme Court from entering Ballari in Karnataka and Anantapur and YSR Kadapa districts in Andhra Pradesh in connection with illegal mining case.
Whether seeks to be a king maker, Janardhana Reddy said it depends on the results and will be known on May 13.
When asked whom he would support, the BJP or the Congress in the event of a hung Assembly, "whoever supports my party's agenda like the promises I made to the public from my party, whoever supports...I will go with them," Janardhana Reddy said.
He said some parties indulge in politics based on caste and religion.
"We want to be away from such things. Our party is guided by the principles of Basaveswara (12th Century philosopher) for the establishment of an equitable and welfare state", he said, adding "both Congress and BJP are our rivals".
In the 2008 assembly elections, when the BJP fell short of a majority by a few seats, he was among those who played a key role in "Operation Kamala"- by ensuring defection of other party MLAs and their re-election on saffron party ticket which helped BJP form a government on its own in Karnataka for the first time, under the leadership of party strong man B S Yediyurappa.
Janardhana Reddy had been inactive politically for nearly 12 years now, since the time he was arrested by the CBI for his alleged role in the mining scam.
"Unfortunately, I had to be away from people for 12 years because of political conspiracies. It was due to the conspiracies there had been a situation for the past 12 years that I was (kept away)," he claimed.
According to Janardhana Reddy people in Karnataka had hope from the BJP that it will do works for the betterment of people. "But BJP failed to fulfill it".
People have seen the rule of both BJP and Congress and now want a new party which they can trust upon, Janardhan Reddy said adding "not only North Karnataka, Kalyana Karnataka, People from across Karnataka have belief in me".
Janardhana Reddy further said his wife Aruna Lakshmi, who is contesting the polls from Ballari city assembly segment against his elder brother G Somasekhara Reddy, will also win by huge majority.
When asked about what does he feel about his wife contesting against his brother-- a political fight between family members, he said, "We don't think who is the opponents it is an electoral fight".
Ahead of the 2018 Assembly polls, the J P Nadda-led party had disassociated itself from the mining baron, with the then BJP national President Amit Shah stating that "BJP has nothing to do with Janardhana Reddy."
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
India is witnessing a sharp rise in trojanised Android APK scams, as cybercriminals increasingly exploit fake government, banking, LPG, challan, and welfare scheme apps to seize full remote control of victims’ smartphones.
Cybersecurity investigators warn that attackers are now widely deploying Remote Access Trojan (RAT) malware, often powered by leaked builder kits such as CraxsRAT and heavily modified custom payload frameworks. Once installed, these malicious APKs can convert an ordinary Android phone into a fully controlled fraud device, enabling silent surveillance, banking theft, and mass scam propagation.
These malware campaigns are primarily being distributed through WhatsApp, Telegram, SMS phishing links, and fake APK download websites, where users are tricked into installing apps disguised as:
- e-Challan apps
- SBI KYC verification tools
- PM Yojana portals
- mParivahan clones
- LPG booking apps
- fake adult video call apps
As the scale of the threat intensifies, cybersecurity startup TraceX Labs has introduced TraceX Guard, positioning it as a frontline mobile defence platform against APK fraud, RAT infections, QR scams, and malicious permission abuse.
Fear-Based Social Engineering Behind the Surge
According to investigators, these frauds typically begin with panic-driven social engineering messages sent over WhatsApp or Telegram.
Common bait messages include:
- Your traffic challan has been issued
- Your SBI KYC is pending
- PM Yojana verification required
- Your LPG cylinder booking failed
- Your bank account will be blocked
These alerts often include fake challan numbers, vehicle details, Aadhaar-linked references, or forged bank notices, creating a sense of urgency that pushes victims to install the malicious APK without verification.
One of the most dangerous variants currently in circulation is a fake mParivahan-style application, which closely mimics India’s legitimate transport services interface while secretly embedding a hidden RAT payload.
How the Malware Takes Over Smartphones
Once installed, the malicious APK immediately requests dangerous permissions, including:
- Accessibility access
- SMS permissions
- Call logs
- Notifications
- File storage
- Battery optimization exemptions
Security researchers say Accessibility Service abuse remains the most critical attack vector, allowing the malware to silently:
- read screen contents
- detect banking and UPI apps
- auto-click Allow / Confirm / Pay buttons
- capture OTPs
- launch hidden overlays
- navigate banking sessions
- trigger silent fund transfers
Because these actions occur directly on the victim’s trusted device, attackers are often able to bypass traditional fraud detection systems.
Within minutes, victims may lose control over:
- bank balances
- UPI wallets
- Aadhaar and PAN scans
- contact lists
- personal photos and media
- incoming calls
- SMS OTPs
In many cases, the malware also self-propagates by forwarding malicious APK links through the victim’s own WhatsApp groups and Telegram chats, triggering a chain infection effect across trusted social circles.Fake RTO Challan APKs Become the Most Dangerous Variant
Among the most active campaigns, fake RTO challan APK scams have emerged as one of the most financially destructive.
Victims are first lured into paying a ₹1 “verification fee”, after which the malicious app requests highly sensitive information such as:
- card number
- expiry date
- CVV
- UPI PIN
- net banking credentials
- even ATM PINs
Cybersecurity experts stress that no legitimate government payment system ever asks for an ATM PIN inside an app, making this an immediate red flag.
Once payment details are entered, the embedded RAT intercepts OTPs and silently completes unauthorized transactions.
India’s Mobile Fraud Crisis Reaches Critical Levels
Investigators estimate that more than 70% of reported cyber fraud cases in India now originate from mobile devices, with millions of complaints linked to:
- malicious APKs
- phishing URLs
- QR scams
- RAT droppers
- banking session hijacks
- WhatsApp fraud chains
The impact is particularly severe across Tier-2 and Tier-3 regions, where smartphone adoption has expanded faster than awareness around:
- APK sideloading risks
- dangerous permissions
- fake banking overlays
- accessibility abuse
- WhatsApp APK scams
This has effectively turned Android smartphones into the primary battlefield of India’s financial cybercrime ecosystem.
TraceX Guard Introduced as a Real-Time Defence Layer
In response to this rapidly evolving threat landscape, TraceX Labs has launched TraceX Guard, an AI-powered multilingual Android security suite built specifically for India’s APK fraud ecosystem.
The platform offers:
- real-time APK scanning
- malicious permission detection
- hidden app discovery
- RAT behaviour monitoring
- QR & phishing URL safety grading
- OTP and SIM fraud alerts
- Wi-Fi hotspot verification
- ransomware defence
- India-specific scam intelligence feeds
- support for 10+ regional languages
Its offline-first AI architecture allows users to scan threats without uploading personal data, making it especially useful for privacy-conscious users and low-connectivity regions.
TraceX Labs says the system is specifically trained to detect patterns used in:
- fake challan scams
- counterfeit SBI APKs
- PM Yojana malware
- wedding invitation APK attacks
- honey-trap adult apps
- Telegram-based RAT droppers
From Phishing to Malware-Driven Financial Warfare
Cybersecurity analysts say this marks a major shift in India’s digital threat landscape.
What once began as simple phishing links has now evolved into malware-driven financial warfare at scale, where a single infected smartphone can silently compromise:
- families
- WhatsApp groups
- banking accounts
- local communities
- social trust networks
With losses from mobile-first fraud already running into tens of thousands of crores, experts believe the future of cyber defence will increasingly depend on preventive mobile security tools capable of stopping unsafe APKs before installation.
In that battle, TraceX Guard is emerging as one of the most important first lines of defence for India’s digital users.
Download Now : https://play.google.com/store/apps/details?id=com.tracexlabs.guard
