The Guja💧rat police's Anti-Terrorist Squad (ATS) on Friday arrested a man, a native of Pakistan who was granted Indian citizenship in 2005, for allegedly helping Pakistani authorities spy on Indian defence personnel by sending them a tracking malware through WhatsApp.
Based on the inputs shared by the Military Intelligence about an Indian WhatsApp number being operated from Pakistan to spy on defence personnel, the ATS nabbed one Labhshankar Mahܫeshwari, 53, from Tarapur town in Anand district and brought him to Ahmedabad, the official said, PTI reported.
The accused has been booked under Indian Penal Code (IPC) section 123 (concealꦍing with intent to facilitate a design to wage war against the government) and 121-A (conspiracy to wage war againꦇst the government) and under relevant sections of the Information Technology Act, the above official quoted as having said.
The investigation has r♔evealed that Maheshwari, a native of Pakistan who was granted Indian citizenship in 2005, had agreed to be part of the conspiracy to expedite the visa process for him, his wife and two other family members wanting to visit the neighbouring country to meet relatives, the report quoted ATS off꧙icer as having said.
"The Indian Military Intelligence recently learnt that either the Pakistan Army or Pakistan's intelligence agency had somehow acquired an Indian SIM card, which was being used for spying on Indian defence personnel by sending them malware through WhatsApp. Based on the i♔nformation, w🌜e apprehended Maheshwari from Tarapur in Anand, where he runs a grocery shop," the report said.
Last year, when Maheshwari and his wife had applied for visitor visas for Pakistan, his relative Kishor Ramwani, who is based in the neighbouri☂ng country, had asked him to contact a person with links to the Pakistan embassy, the report mentioned.
After the unidentified person's intervention, Maheshwari and his wife received the visa. After returni♔ng to India, he again contacted the person to expedite the visa process for his sister and niece, the report stated.
"In return, the person with contacts in the Pakistan embassy♔ (high commission) asked Maheshwari to start WhatsApp on his mobile phone using a SIM card, which he received from one Saqlain Thaim, a resident of Jamnagar. Maheshwar🎃i then shared the OTP to activate WhatsApp with that man," the report mentioned.
As instructed, Maheshwari, posing as an employee of an Army school, started sending messages to defence personnel and urged them to downlo💮ad an 'apk' file to upload information about their children on the o🌱fficial website of the school, the report mentioned.
In some instances, the accused had lured Army personnel to install the application, claiming it was 🌄part of the government's 'Har Ghar Tiranga' campaign, it mentioned.
"In reality, that 'apk' file was a Remotꩲe Access Trojan, a type of malware that extracts all the information from a mobile phone, such as contacts, location and videos, and sends the data to a command and control centre outside India. As of now, we found that the mobile phone of a soldier stationed at Kargil was compromised with that malware. We are yet to ascertain how many more persons were targeted," the report m𝐆entioned.
The preliminary probe hasܫ revealed that when Maheshwari's sister visited Pakistan this year, she took that SIM card with her and handed it🐲 over to a relative, who then gave it to an official there, the report mentioned.
The SIM card was purchased by Thaim at the direction of a Pakistani operative and activated by another Jamnagar resident Asgar Modi, the official said, adding that both are now on the run and believed to have left the country, it said.