The reports confirm an active, sophisticated Android malware campaign named `NexusRoute` that impersonates the Indian Government Ministry, specifically the `mParivahan` and `e-Challan` services. This campaign is a multi-stage operation combining phishing, surveillance, and financial fraud to harvest sensitive data including `UPI PINs`, `OTPs`, and banking credentials.
Analysis of the `NexusRoute` threat indicates an industrialized operation with the following characteristics.
Distribution Strategy
Malicious `APKs` are hosted on GitHub, supported by automated phishing domain generation (e.g., `rtochallan[digits].store`, `.shop`, `.online`). Phishing lures often involve a bogus `₹1` "ownership verification" payment to trick users into entering financial data.
Technical Execution
The malware uses a native-backed Android Remote Access Trojan (`RAT`) that employs advanced obfuscation and dynamic code loading via native `.so` libraries and `JNI` to evade traditional detection.
Persistence Mechanisms
Once installed, it abuses Android's `Accessibility Services` and declare high-risk permissions such as `REQUEST_INSTALL_PACKAGES` and `SYSTEM_ALERT_WINDOW`. It ensures continuous execution through `BroadcastReceivers`, foreground services, and battery optimization exemptions.
Capabilities
The `RAT` provides operators with full surveillance control, including `SMS` interception, keylogging, screen capture, remote camera/microphone access, and real-time `GPS` tracking.
Attribution Indicators
Technical artifacts link the exfiltration routines to the address `
gymkhana.studio@gmail.com`, which is associated with "Gymkhana Studio," a branding involved in more extensive Android obfuscation and spyware tooling.
Immediate Action Recommendations
1. Identity Verification.
Only install the official `mParivahan` app from the Google Play Store. Never download transport or government-related `APKs` from GitHub or third-party links received via `SMS`.
2. Permission Audit.
If you suspect an infection, check `Settings > Apps > Special app access > All files access` and `Settings > Accessibility` for any app named "NexGen mParivahan" or other suspicious entries.
3. Financial Security.
If you have interacted with a fake `e-Challan` site, immediately change your `UPI PIN` and monitor your bank statements for unauthorized `₹1` or larger debits.
4. Network Isolation.
If high-risk permissions were granted to a suspicious app, back up essential data and perform a factory reset of the device to ensure the native-level payloads are removed.
The scale and engineering of `NexusRoute` represent a significant national-scale threat to Indian financial infrastructure and digital trust. Management of this risk requires ongoing coordination between law enforcement and financial platform providers.