Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones

Posted on December 2, 2025December 2, 2025 By CWS

India’s Division of Telecommunications (DoT) has ordered smartphone producers to preload a government-backed cybersecurity app, “Sanchar Saathi,” on all new units offered within the nation.

The order, issued privately on November 28, 2025, provides main gamers like Apple, Samsung, Xiaomi, Vivo, and Oppo 90 days to conform, requiring the “Sanchar Saathi” app to be put in as a non-removable function on each handset.​

The transfer indicators a major tightening of state management over shopper electronics on this planet’s second-largest telecom market, which boasts over 1.2 billion subscribers.

Authorities officers argue the measure is a essential protection in opposition to a surge in digital fraud and cybercrime. In accordance with the directive, the app serves as a “citizen-centric” defend, enabling authorities to curb using stolen telephones and fight spoofed IMEI numbers, which are sometimes utilized in legal actions.​

Sanchar Saathi: A Digital “Communication Companion”

Launched earlier this 12 months, the Sanchar Saathi (Hindi for “Communication Companion”) platform was initially an online portal designed to empower cell subscribers. The obligatory app model integrates a number of key security options straight into the person interface:​

Chakshu: A reporting device for suspected fraud communications, together with malicious calls, SMS, or WhatsApp messages.​

Misplaced/Stolen Cell Blocking: Makes use of the Central Tools Identification Register (CEIR) to dam stolen units throughout all networks, rendering them ineffective to thieves.​

Connection Administration: Permits customers to verify “Know Cell Connections in Your Identify” to determine unauthorized SIM playing cards registered in opposition to their identification.​

Genuineness Checks: Verifies if a tool’s {hardware} and IMEI are genuine.​

Whereas the federal government highlights recovered units over 700,000 misplaced telephones have reportedly been traced utilizing the system, the obligatory nature of the app has sparked rapid concern.​

Trade Pushback and Privateness Fears

The directive requires that the app be “undeletable,” a situation that’s more likely to upset privateness advocates and producers like Apple, which has traditionally resisted preloading third-party software program.

Trade executives, talking on situation of anonymity, expressed frustration over the shortage of prior session, fearing the “compelled” app might compromise person belief and gadget efficiency.​

Privateness advocates are involved {that a} government-controlled app with intensive system entry might theoretically be used for surveillance. Nonetheless, the Indian authorities has constantly denied such intentions, stating that the directive is solely a shopper safety measure.

Producers should additionally push the app to present units by way of software program updates, guaranteeing the complete lively person base is finally coated.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Cybersecurity, Government, India, Mandates, Smartphones, Undeletable

Post navigation

Previous Post: Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users
Next Post: Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

Related Posts

FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence Cyber Security News
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark