Beijing, Dec 13: China has reported its first case of Omicron variant of COVID-19 amid a spike in coronavirus infections stated to be that of new Delta strain "sub-lineage AY.4", prompting authorities to bar millions of people in the eastern province from travelling.

The first case of Omicron variant of coronavirus was reported in Tianjin city in north China, state-run CGTN-TV reported on Monday.

A person who came from overseas was tested positive for the new variant, the report said.

Details on the person's nationality or travel history were not immediately disclosed.

Officials said the individual is an asymptomatic COVID-19 patient and its respiratory specimen has shown existence of the Omicron variant on December 9 after tests.

The person was under closed-loop management since entry to Tianjin and is now being treated in isolation in hospital, the report said.

Meanwhile, China is experiencing a major outbreak of the Delta strain sub-lineage AY.4 in Zhejiang province where 138 locally-transmitted confirmed COVID-19 cases and one asymptomatic carrier were reported between December 5 and 12, state-run Xinhua news agency reported on Sunday.

Of the 138 cases, 44 were reported in Ningbo, 77 in Shaoxing and 17 in the provincial capital of Hangzhou.

The whole-genome sequencing and analysis found that the cases in the three cities were caused by the Delta strain sub-lineage AY.4, which is stated to be more transmissible and carries a higher viral load than the original novel coronavirus, the report said, quoting an official of the Zhejiang provincial centre for disease control and prevention.

Local authorities have imposed restrictions on public gatherings and travelling out of the province to prevent the virus from spreading further, it said. The province has a population of 64.6 million.

The Chinese mainland recorded 101 confirmed COVID-19 cases on Sunday, with 80 linked to local transmissions and 21 from overseas, according to National Health Commission (NHC) data released on Monday.

A total of 17 new asymptomatic cases were also recorded and 444 asymptomatic patients remain under medical observation.

NHC on Monday reported 80 new Covid cases, including 74 in Zhejiang, five in Inner Mongolia and one in Shaanxi provinces.

The spurt of coronavirus cases came ahead of the February 2022 Beijing Winter Olympics, causing anxiety among the officials here.

China, which has effectively curbed international travel, has been reporting sporadic spurt of cases, raising questions of its zero-case policy of coronavirus.

As on Sunday, the total number of confirmed COVID-19 cases on mainland China reached 99,780 since the virus broke out in the central city of Wuhan in 2019. The death toll stands at 4,636.

While 1,381 patients, 27 in serious condition, are still under treatment, 93,763 have recovered so far, the NHC said.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



New Delhi: India’s national cybersecurity agency, the Indian Computer Emergency Response Team (CERT-In), has issued a high-severity alert warning WhatsApp users of an active account takeover campaign using a new technique known as “GhostPairing," in an advisory released on December 19.

CERT-In said cybercriminals are exploiting WhatsApp’s device-linking feature to gain unauthorised access to user accounts without the need for passwords or SIM card swaps, as reported by The Indian Express. The attackers, the agency warned, deceive users into entering pairing codes, which silently grants control of the account to a malicious device.

ALSO READ: Teen killed in alleged honour killing over inter-community relationship, brother, his friend arrest

According to CERT-In, the GhostPairing method works by tricking victims into approving an attacker’s browser as a trusted linked device. The advisory said, “The attack manipulates users into granting access through a pairing code that appears legitimate." It further added that once access is granted, attackers can fully operate the account through WhatsApp Web.

Last month, the Department of Telecommunications directed messaging platforms such as WhatsApp, Signal and Telegram to implement continuous SIM binding which required accounts to remain linked to an active SIM card. As part of this directive, companion web sessions are expected to be logged out periodically and re-authenticated using QR codes.

CERT-In said the GhostPairing campaign typically begins with a message appearing to come from a trusted contact, often reading, “Hi, check this photo”. The message contains a link designed to mimic a Facebook-style preview, and clicking the link leads users to a fake verification page, where they are prompted to enter their phone number and a code. Victims unknowingly allow attackers to link their WhatsApp account to an external device, by completing these steps,.

Once compromised, attackers can access messages, photos, videos and voice notes in real time, and can impersonate the victim to send messages to individual contacts or groups, the agency said.
The advisory also noted that WhatsApp currently allows multiple devices to be linked to a single account, a feature that is being misused in such attacks. In October, the Indian Cybercrime Coordination Centre under the Ministry of Home Affairs had flagged a related trend involving scammers using social media advertisements to lure users into linking their WhatsApp accounts.

While the government’s SIM-binding push is intended to limit such fraud, it has raised concerns among legal experts and digital rights groups, who argue that constant SIM verification, could affect privacy and disrupt multi-device usage, particularly for professionals.

To reduce risk, CERT-In has urged users to avoid clicking on suspicious links, even if they appear to come from known contacts, and to never enter phone numbers or verification codes on external websites claiming to be linked to WhatsApp or Facebook. Users have also been advised to regularly review the “Linked Devices” section within WhatsApp settings and immediately log out of any unfamiliar sessions.

For organisations relying on WhatsApp for communication, the agency has recommended security awareness training, closer monitoring for phishing attempts, and the establishment of clear response protocols to detect and contain account compromises quickly.