iWorld
OnMobile leads $13 million funding in Chingari app
MUMBAI: Bengaluru-based OnMobile has led a $13 million (Rs 98.7 crore) funding round in short video platform Chingari. The company believes that this investment will allow Chingari to accelerate its growth from 56 million users to over 100 million users.
Following this investment, OnMobile will soon integrate and distribute Onmo, the company's direct-to-customer gaming platform on the Chingari app. In a recent statement, the company also revealed its plans to collaborate on other product integrations in the future.
"The Chingari team has built a terrific product with great user retention and growth. Onmo gaming’s short format challenges and Chingari's short-form videos complement each other well," said OnMobile CEO Krish Seshadri.
Investors who participated in this round include Republic Labs US, Astarc Ventures, White Star Capital, India Tv (Rajat Sharma), JPIN Venture Catalysts Ltd, ProfitBoard Ventures, Raghunandan G of Zolve (Co-Founder,Taxi4sure) and some large family office funds from the UK.
Chingari co-founder and CEO Sumit Gosh asserted that Chingari will soon become a content super media app for a billion Indians.
"We couldn't have hoped for a better partner than OnMobile and Krish to help Chingari embody its vision and become a content super media app for Bharat, and help engage the billion Indians. With our visions aligned, this partnership promises to be a winning collaboration," added Gosh.
Last year, Chingari had raised $1.4 million from a series of Angels, including Jasminder Gulati, FJ Labs (Fabrice Grinda), Angelist, Utsav Somani’s iSeed, Village Global, and Blume Founders Fund.
OnMobile executive chairman François-Charles Sirois remarked, ''We are very excited about this investment and partnership bringing millions of users to the new ONMO gaming service while providing immediate business value and increased user reach for both companies.''
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






