Connect with us

iWorld

DoT amends VSAT license rules to enable infrastructure sharing

Published

on

Mumbai: The department of telecommunications (DoT) has amended the commercial VSAT license rules to enable sharing of satellite infrastructure and backhaul connectivity for cellular mobile services and access service providers.  

According to the new rules, the licensee may share its own active and passive infrastructure for providing other services authorized to it under any other telecom license issued by the licensor. The sharing of infrastructure will be governed by the terms and conditions of respective licenses and amendments/guidelines to be issued by the licensor from time to time. It also mentioned that an authorised gateway hub operated by the satellite provider itself is permitted to be shared with the satellite bandwidth seeker.

DoT also amended the existing rules to allow backhaul connectivity for cellular mobile services through satellite using VSAT to the access service providers; it allowed backhaul connectivity using VSAT to access service providers to establish Wi-Fi hotspots and mandated that the VSAT terminal of the commercial VSAT CUG service provider, which is used to provide cellular mobile backhaul link or Wi-Fi mobile backhaul link, is to be located in the service area of the access provider, where the backhaul link is used.

Advertisement

The VSAT hub can be located anywhere in the country. The link from the hub station to the respective network element of the cellular mobile network can be provided through the terrestrial obtained from an authorised service provider.

The move is expected to reduce the capital and operational expenditure of telcos and is a long pending demand of the industry. Earlier, only mobile towers and some active electronic components in the network were allowed to be shared among telecom service providers.

The amendment which allows the use of satellite service through VSAT terminals to provide backend connectivity for mobile networks is expected to boost the rollout in difficult terrain and remote areas.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

iWorld

Meta warns 200 users after fake Whatsapp spyware attack

Italy-targeted campaign used unofficial app to deploy surveillance spyware.

Published

on

MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.

Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.

The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.

Advertisement

According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.

A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.

The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.

Advertisement
Continue Reading

Advertisement News18
Advertisement
Advertisement Whtasapp
Advertisement Year Enders

Indian Television Dot Com Pvt Ltd

Signup for news and special offers!

Copyright © 2026 Indian Television Dot Com PVT LTD