London, Dec 2: The UK's medicines regulator on Thursday approved a new antibody treatment against COVID-19, which it believes will also be effective against new variants such as Omicron.

The Medicines and Healthcare products Regulatory Agency (MHRA) said Xevudy or sotrovimab is for people with mild to moderate COVID-19 who are at high risk of developing severe disease.

Developed by GSK and Vir Biotechnology, sotrovimab is a single monoclonal antibody and the drug works by binding to the spike protein on the outside of the COVID-19 virus. This in turn prevents the virus from attaching to and entering human cells, so that it cannot replicate in the body.

I am pleased to say that we now have another safe and effective COVID-19 treatment, Xevudy (sotrovimab), for those at risk of developing severe illness, said Dr June Raine, MHRA Chief Executive.

This is yet another therapeutic that has been shown to be effective at protecting those most vulnerable to COVID-19, and signals another significant step forward in our fight against this devastating disease. With no compromises on quality, safety and effectiveness, the public can trust that the MHRA have conducted a robust and thorough assessment of all the available data, she said.

Sotrovimab is administered by intravenous infusion over 30 minutes and is approved for individuals aged 12 and above who weigh more than 40 kg. The MHRA said it is too early to know whether the Omicron variant has any impact on sotrovimab's effectiveness, but they plan to work with the manufacturers to establish this.

But based on preliminary lab studies, researchers say the drug targets a part of the spike protein of the virus that has not yet undergone big changes or mutations, meaning it should work well against all variants.

In a clinical trial, a single dose of the monoclonal antibody was found to reduce the risk of hospitalisation and death by 79 per cent in high-risk adults with symptomatic COVID-19 infection. Based on the clinical trial data, sotrovimab is most effective when taken during the early stages of infection and so the MHRA recommends its use as soon as possible and within five days of symptom onset.

When administered in the early stages of infection, sotrovimab was found to be effective at reducing the risk of hospitalisation and death in high-risk individuals with symptomatic COVID-19. Based on the data reviewed by the Commission and its expert group, it is clear sotrovimab is another safe and effective treatment to help us in our fight against COVID-19, said Professor Sir Munir Pirmohamed, Chair of the UK's Commission on Human Medicines.

Like molnupiravir, which is an antiviral pill treatment in use, the new therapy has been authorised for use in people who have mild to moderate COVID-19 infection and at least one risk factor for developing severe illness. Such risk factors include obesity, older age groups of 60 and above, diabetes mellitus, or heart disease.

The MHRA reiterated that sotrovimab is not intended to be used as a substitute for vaccination against COVID-19. Following the approval, the UK's National Health Service (NHS) will confirm how this COVID-19 treatment will be deployed to patients.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



New Delhi: India’s national cybersecurity agency, the Indian Computer Emergency Response Team (CERT-In), has issued a high-severity alert warning WhatsApp users of an active account takeover campaign using a new technique known as “GhostPairing," in an advisory released on December 19.

CERT-In said cybercriminals are exploiting WhatsApp’s device-linking feature to gain unauthorised access to user accounts without the need for passwords or SIM card swaps, as reported by The Indian Express. The attackers, the agency warned, deceive users into entering pairing codes, which silently grants control of the account to a malicious device.

ALSO READ: Teen killed in alleged honour killing over inter-community relationship, brother, his friend arrest

According to CERT-In, the GhostPairing method works by tricking victims into approving an attacker’s browser as a trusted linked device. The advisory said, “The attack manipulates users into granting access through a pairing code that appears legitimate." It further added that once access is granted, attackers can fully operate the account through WhatsApp Web.

Last month, the Department of Telecommunications directed messaging platforms such as WhatsApp, Signal and Telegram to implement continuous SIM binding which required accounts to remain linked to an active SIM card. As part of this directive, companion web sessions are expected to be logged out periodically and re-authenticated using QR codes.

CERT-In said the GhostPairing campaign typically begins with a message appearing to come from a trusted contact, often reading, “Hi, check this photo”. The message contains a link designed to mimic a Facebook-style preview, and clicking the link leads users to a fake verification page, where they are prompted to enter their phone number and a code. Victims unknowingly allow attackers to link their WhatsApp account to an external device, by completing these steps,.

Once compromised, attackers can access messages, photos, videos and voice notes in real time, and can impersonate the victim to send messages to individual contacts or groups, the agency said.
The advisory also noted that WhatsApp currently allows multiple devices to be linked to a single account, a feature that is being misused in such attacks. In October, the Indian Cybercrime Coordination Centre under the Ministry of Home Affairs had flagged a related trend involving scammers using social media advertisements to lure users into linking their WhatsApp accounts.

While the government’s SIM-binding push is intended to limit such fraud, it has raised concerns among legal experts and digital rights groups, who argue that constant SIM verification, could affect privacy and disrupt multi-device usage, particularly for professionals.

To reduce risk, CERT-In has urged users to avoid clicking on suspicious links, even if they appear to come from known contacts, and to never enter phone numbers or verification codes on external websites claiming to be linked to WhatsApp or Facebook. Users have also been advised to regularly review the “Linked Devices” section within WhatsApp settings and immediately log out of any unfamiliar sessions.

For organisations relying on WhatsApp for communication, the agency has recommended security awareness training, closer monitoring for phishing attempts, and the establishment of clear response protocols to detect and contain account compromises quickly.