What is the Fake E-Challan App Scam in Nashik?
The fraud starts when victims receive a WhatsApp message with a link to download an app posing as an E-Challan application. Thinking it is official, many install it and unknowingly grant permissions that allow malware to run.
What the malware can do
- Steal banking details (login IDs, PINs, and OTPs).
- Gain control of WhatsApp accounts and contact lists.
- Access and exfiltrate sensitive phone data.
Why this cyber fraud is dangerous
- It imitates official apps (uses government-like branding).
- It intercepts OTPs and banking credentials.
- It hijacks WhatsApp and spreads rapidly by messaging contacts.
How to protect yourself from fake apps
- Download apps only from trusted sources (Google Play or Apple App Store).
- Avoid unknown links shared via WhatsApp, SMS, or email.
- Enable two-factor authentication (2FA) on WhatsApp and banking apps.
- Review app permissions before installing.
- Stay informed with alerts from the National Cyber Crime Portal.
What to do if you installed the fake app
- Uninstall the app immediately.
- Run a security scan with a trusted antivirus app.
- Change banking, email, and WhatsApp passwords; enable 2FA everywhere.
- Report the incident at the National Cyber Crime Portal or call 1930 (India’s Cyber Helpline).
- Inform your bank so they can secure or monitor your account.
Final Thoughts
The fake E-Challan app scam in Nashik is a wake-up call. With 56 people affected, cybercrime is happening closer than you think. Stay alert and share awareness to prevent more people from falling victim.
Frequently Asked Questions (FAQ)
1. How can I report cyber fraud in India?
Report incidents on the National Cyber Crime Reporting Portal or call the Cyber Helpline at 1930.
2. How do I check if an E-Challan app is fake?
A genuine app will be listed on Google Play Store or Apple App Store. Never install apps from links shared via WhatsApp or SMS without verifying the source.
3. What should I do if my WhatsApp is hacked?
Log out of all devices, reset passwords, enable two-factor authentication, and inform your contacts about the compromise.