Skip to content
-
24°N 24°N 24°N

Today Latest News | Breaking News

24°N 24°N 24°N

Today Latest News | Breaking News

  • Home
  • India
  • Technology
  • Entertainment
  • Sports
  • Politics
  • Business
  • World News
  • Home
  • India
  • Technology
  • Entertainment
  • Sports
  • Politics
  • Business
  • World News
Close

Search

Home/Technology/Fake “Cockroach Janta Party” Android App Found Stealing OTPs and Banking Data, Security Researchers Warn
Cockroach Janta Party
TechnologyIndia

Fake “Cockroach Janta Party” Android App Found Stealing OTPs and Banking Data, Security Researchers Warn

By 24°N Desk
May 22, 2026 3 Min Read
0

Android users in India are being warned about a dangerous spyware campaign linked to a fake mobile application named “Cockroach Janta Party.” Cybersecurity researchers say the malicious app is being spread through WhatsApp, Telegram channels, and unofficial APK download websites to infect smartphones and steal sensitive information.

The warning was issued by TraceX Labs, which recently published a detailed threat analysis about the malware campaign. According to researchers, the fake APK behaves like an advanced Android banking trojan and spyware tool capable of monitoring device activity, capturing OTPs, and collecting private user data in the background.

Security experts have classified the threat as critical due to the malware’s ability to abuse Android accessibility features and silently interact with apps on infected devices.

Malware Campaign Using Viral Trend to Target Android Users

Researchers say attackers are taking advantage of the growing online popularity of the “Cockroach Janta Party” trend to trick users into downloading the fake application.

Instead of using the Google Play Store, the APK is reportedly being shared directly through:

  • WhatsApp chats and groups
  • Telegram channels
  • Third-party APK download sites
  • Fake Android app pages
  • Social media sharing campaigns

Experts explained that users are often convinced to manually install the APK by enabling Android’s “Install from Unknown Sources” option, which disables important built-in security protections.

Cybersecurity analysts warned that unofficial APK files remain one of the biggest sources of Android malware infections because they bypass Google’s standard app verification systems.

Fake App Requests Dangerous Permissions

After installation, the spyware reportedly asks users for several sensitive Android permissions.

According to the report, the app can request access to:

  • SMS messages
  • Contacts
  • Call logs
  • Device storage
  • Camera permissions
  • Accessibility Services

Researchers say the Accessibility permission is particularly dangerous because it can give malware deep control over a smartphone.

If granted, the spyware may be able to:

  • Read OTPs and passwords displayed on screen
  • Monitor banking app activity
  • Capture sensitive financial information
  • Perform actions automatically in the background
  • Bypass certain Android security prompts

Security experts noted that many modern Android banking trojans now rely on accessibility abuse because it allows attackers to spy on users without using advanced hacking methods.

Researchers Found Spyware and Banking Malware Features

During technical analysis of the APK, cybersecurity researchers reportedly discovered multiple hidden spyware modules inside the fake application.

According to the investigation, the malware is capable of:

  • Intercepting SMS messages
  • Forwarding banking OTPs
  • Stealing contacts and call history
  • Collecting photos and media files
  • Monitoring installed applications
  • Gathering device information
  • Accessing stored documents
  • Running surveillance operations silently

The report suggests that the malware may be designed for long-term spying and financial fraud activities.

Researchers also observed suspicious background communication between infected devices and remote servers, indicating active data theft operations.

Telegram Infrastructure Used to Hide Malicious Activity

One of the more concerning findings in the report is the malware’s reported use of Telegram Bot API infrastructure for communication.

Experts explained that attackers can use Telegram-based systems to blend malicious traffic with normal encrypted internet traffic, making the spyware harder to detect through regular network monitoring.

According to the advisory, the malware can potentially steal:

  • Banking OTPs
  • SMS conversations
  • Contacts and call records
  • Photos and videos
  • Device identifiers
  • SIM-related information
  • Application activity data

Researchers warned that victims could face banking fraud, account compromise, identity theft, and privacy-related risks if their devices become infected.

Indian Android Users Main Focus of Campaign

The investigation indicates that Indian Android users are the primary target of the spyware campaign. Researchers reportedly found references connected to Indian telecom services within the malware code, suggesting a focused targeting strategy.

The spyware is believed to affect Android devices running Android 8 through Android 14 and mainly spreads through side-loaded APK installations outside official app marketplaces.

How Users Can Protect Their Android Devices

Cybersecurity experts recommend following basic mobile security practices to reduce the risk of infection.

Recommended safety steps include:

  • Download apps only from trusted sources like the Google Play Store
  • Avoid APK files shared through WhatsApp or Telegram
  • Keep Google Play Protect enabled
  • Review app permissions carefully before installation
  • Never allow Accessibility access to unknown applications
  • Use authenticator apps instead of SMS-based OTPs whenever possible

Users who think they may have installed the fake app are advised to remove it immediately, revoke Accessibility permissions, change important passwords from another trusted device, and monitor bank accounts for suspicious activity.

Researchers say spyware campaigns targeting Android users are becoming more advanced as attackers increasingly combine social engineering, fake APK distribution, and trending online topics to spread malware quickly.

Source- https://tracexlabs.com/reports/cockroach-janta-party-malware-threat-report-2026.html

Tags:

Cockroach Janta PartyTraceX Labs
Author

24°N Desk

Follow Me
Other Articles
Drishyam 3
Previous

Drishyam 3 Review: Mohanlal’s Jaw-Dropping Thriller Keeps You Guessing Until the End – Full Movie Review & Rating

Virat Kohli and head
Next

Virat Kohli Refuses Handshake With Travis Head After Heated IPL Clash Between RCB and SRH

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Prove your humanity: 10   +   10   =  

24°N

24°N is a modern digital news platform delivering accurate, timely, and insightful coverage of technology, entertainment, business, and global affairs.

Important Links

  • Contact
  • About us
  • Sitemap
  • Privacy Policy
  • Disclaimer
  • Terms and Conditions
  • Ethics policy
  • Correction Policy
  • Fact checking policy
  • Editorial Team
  • Term of Use
  • Ownership funding information
Copyright 2026 — 24°N. All rights reserved.