Govt Alert: Delete These 3 Dangerous Screen Sharing Apps Now
Govt Alert: Delete 3 Dangerous Screen Sharing Apps

The Indian government has issued a critical cybersecurity alert, urging smartphone users across the country to immediately uninstall three specific screen sharing applications. These apps, masquerading as legitimate tools, have been identified as highly dangerous malware designed to steal sensitive personal and financial information from users' devices.

Three Malicious Apps You Must Remove Immediately

The Computer Emergency Response Team of India (CERT-In), the national nodal agency for cybersecurity, has flagged the following applications as severe threats. The alert, dated December 21, 2025, names these apps explicitly:

  • Screen Share
  • Screen Share (Screen Mirroring)
  • Screen Share - Android TV

These apps are reportedly available on third-party app stores and unofficial websites. They are not found on official platforms like Google Play Store, which makes their distribution channels inherently risky. Users who have downloaded these apps from any source are advised to delete them without delay.

How These Dangerous Apps Compromise Your Security

These malicious screen sharing applications are not what they seem. Once installed, they gain extensive permissions that allow them to operate in the background, far beyond simple screen mirroring functions. The primary danger lies in their ability to act as spyware.

The apps can secretly access and transmit a wide array of private data, including text messages, contact lists, call logs, and even real-time audio and video feeds from the device's microphone and camera. This creates a severe breach of privacy, potentially exposing bank OTPs, personal conversations, and confidential documents to cybercriminals.

Furthermore, by having screen-sharing capabilities, the malware can potentially record every action you take on your phone—from entering passwords and PINs to conducting online banking transactions. This data can be used for financial fraud, identity theft, or blackmail.

Steps to Protect Your Device and Data

In response to this threat, CERT-In and cybersecurity experts recommend a series of immediate actions for all smartphone users.

First and foremost, check your phone's app list right now for the named applications and uninstall them immediately. Do not ignore variants with similar names, as they could be repackaged versions of the same malware.

Secondly, only download apps from official and trusted sources like the Google Play Store or the Apple App Store. These platforms have security checks in place, although they are not foolproof. Avoid sideloading apps from unknown websites or third-party stores, which are common vectors for such threats.

Third, regularly review the permissions granted to your installed apps. Be wary of any application, especially a utility tool like a screen sharer, that requests excessive permissions such as access to SMS, contacts, or the ability to record audio in the background. Revoke unnecessary permissions.

Finally, ensure your device's operating system and all legitimate apps are updated to the latest versions. Security patches often fix vulnerabilities that malware exploits. Using a reputable mobile security or antivirus application can provide an additional layer of protection.

This government alert underscores the ever-present risks in the digital ecosystem. Cybercriminals continuously develop new methods to trick users, often hiding malware inside apps that offer useful functionality. Staying informed, vigilant, and adhering to basic cybersecurity hygiene are the best defenses against such dangerous threats targeting your personal data and financial security.