Researchers Discover 'Digital Lutera' Android Toolkit That Can Hijack UPI Accounts; NPCI Responds

Victims may remain unaware that their UPI account has been taken over on another device as the attack happens silently, as per researchers.

Advertisement
Written by Shaurya Tomer, Edited by David Delima | Updated: 11 March 2026 16:23 IST
Highlights
  • The Digital Lutera toolkit targets Android devices to bypass SIM checks
  • It is spreading via fake apps shared on Telegram, per researchers
  • CloudSEK says it has reported the threat to authorities

The toolkit is designed to bypass restrictions by directly targeting the Android OS

Photo Credit: CloudSEK

The government recently enforced a SIM-binding mandate for messaging and financial platforms, intending to curb digital fraud and identity misuse. As per the Department of Telecommunications (DoT), this move is meant to ensure that services like messaging platforms and UPI apps are linked to the SIM card on the user's primary device, reducing the ease of account takeover. Cybersecurity researchers have now identified a toolkit designed to bypass these restrictions by directly targeting the Android operating system, intercepting messages and accessing the victims' UPI accounts by spoofing the authorisation process and tricking the system into thinking it is legitimate.

Update (March 11, 4:20pm): This article has been updated to reflect a statement from the National Payments Corporation of India (NPCI) in response to CloudSEK's report, and the headline has been updated accordingly.

What Is the “Digital Lutera” Toolkit

Researchers at cybersecurity firm CloudSEK have identified a fraud toolkit named Digital Lutera, which enables cybercriminals to bypass the recently introduced SIM-based verification mechanism used for digital payment systems in India. Digital Lutera has been identified by researchers using findings provided by the cybersecurity firm named CloudSEK. This fraud toolkit is used to bypass digital payment systems using UPI-linked bank accounts and SMS-based OTP verification.

Advertisement

Unlike traditional malware that directly targets banking apps, Digital Lutera works by modifying system-level behaviour on Android devices, as per the firm. The toolkit is claimed to use LSPosed, a framework that enables the injection of custom modules into the Android runtime environment. With LSPosed, system functions can be intercepted, including those responsible for handling incoming SMS messages.

Advertisement

CloudSEK found that the malware toolkit is being spread via Telegram groups, where attackers share information about financial fraud operations. Researchers found over 20 Telegram groups, each of which has several members.

How the Attack Happens

The attack relies on altering Android's system behaviour rather than breaking into the payment app itself. According to CloudSEK, it takes place in multiple phases. It begins when the victim unknowingly installs a malicious Android application, often disguised as something harmless, such as a traffic challan notice or a wedding invitation APK.

Advertisement

These Trojanised apps request permissions such as Read and Write SMS. The malware is said to run silently in the background and forward incoming verification messages to the attacker through LSPosed modules. Using this access, the attacker tries to log in to the victim's account through a modified version of the app on his/her own device.

Once the service sends an OTP to log in to the victim's account to the victim's phone number, it is intercepted by the Trojan and forwarded to the attacker. The app then generates a device binding token, which is commonly used by banks to verify the legitimacy of the device.

Advertisement

Because the message originates from the victim's SIM card, the telecom network automatically identifies it as legitimate, the cybersecurity firm noted. Once the device is successfully linked, CloudSEK said the attacker can trigger a UPI PIN reset request. This allows the attacker to set a new UPI PIN and gain full control of the victim's payment account, enabling unauthorised transactions.

Researchers say the attack works because many financial systems rely on the mobile number provided by telecom networks as proof of device ownership. As per the firm, victims may remain unaware that their UPI account has been registered or accessed on another device as the attack happens silently.

CloudSEK said it had responsibly disclosed its findings to financial institutions and authorities to help them come up with mitigation strategies, before its report was published.

The National Payments Corporation of India (NPCI) responded to the claims made by CloudSEK. In a statement provided to Gadgets 360 on Wednesday, a spokesperson for the organisation said: 

“This is in reference to recent media reports citing a report on certain fraud-related modus operandi using latest technology to bypass UPI device binding.

NPCI has examined the report and clarifies that robust checks and safeguards are already in place to address such risks. UPI is designed with multiple layers of security and authentication mechanisms to ensure that transactions remain safe and secure.

NPCI continues to work closely with banks and ecosystem partners to monitor risks and strengthen security measures, ensuring that digital payments remain safe and reliable for users.”

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: CloudSEK, Cybersecurity, SIM Binding, DoT
Advertisement

Related Stories

Popular Mobile Brands
  1. Xiaomi 17 Ultra Finally Arrives in India at This Price
  2. Vivo Y51 Pro 5G Launched With 7,200mAh Battery at This Price in India
  3. Xiaomi 17 Launched in India With Snapdragon 8 Elite Gen 5, Leica Cameras
  4. Samsung Galaxy A57 Renders Leak Online Again; Launch Expected Soon
  5. Poco X8 Pro Series Confirmed to Launch in India With This Battery
  6. DxOMark Ranks iPhone 17 Pro Above Galaxy S26 Ultra in Camera Performance
  7. Exclusive: iQOO to Skip Neo Series Launch in India in 2026
  8. Here's Why Your Next Laptop Could Get Up to 35 Percent Costlier in 2026
  9. Samsung Galaxy S26 Series Goes on Sale in India: See Price, Features
  10. AlphaGo Turns 10: How DeepMind's Breakthrough Set the Stage for AGI
  1. YouTube’s Likeness Detection Tool Expanded to Government Officials and Journalists
  2. GainBitcoin Crypto Scam Case: CBI Arrests Darwin Labs CTO and Co-Founder Ayush Varshney
  3. AlphaGo Turns 10: How DeepMind’s Breakthrough Set the Stage for AGI
  4. PS Plus Game Catalogue Lineup for March Will Reportedly Include Warhammer 40,000: Space Marine 2
  5. Vivo Y51 Pro 5G Launched in India With 7,200mAh Battery, 50-Megapixel Camera: Price, Specifications
  6. Samsung Galaxy A57 Renders Leak Online Again via Retailer Listing; Launch Expected Soon
  7. Binance Founder Changpeng Zhao Questions Forbes Wealth Ranking After $47 Billion Surge
  8. Researchers Discover 'Digital Lutera' Android Toolkit That Can Hijack UPI Accounts; NPCI Responds
  9. Poco X8 Pro Series Battery Capacity and Other Key Features Revealed as India Launch Nears
  10. Redmi K90 Ultra Tipped to Feature 165Hz Display, Battery Capacity Could Exceed 8,000mAh
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.