Tuesday, March 4, 2025
HomeCryptocurrency hackBeware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform -...

Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin

Published on

SIEM as a Service

Follow Us on Google News

Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest in this fake platform.

Reliance Jio Infocomm is one of the biggest telecommunication firms in India it is a wholly owned subsidiary of Reliance Industries.

Cyber Criminals uploaded Fake Cryptocurrency Apps under JioCoin name into Google Play store and compromising users to invest in it.

JioCoin

Since Jio holding Million of customers in India, this fraudulent attempts by unscrupulous persons to misguide the public in the name of Jio to steal the user’s information.

Also Read 17-year-old schoolboy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords

According to Jio “Any such apps using the JioCoin name are fake and people are advised to refrain from dealing with any of them.

Reliance Jio takes a serious note of such fraudulent attempts” Also, A Website Claimed that JioCoin, a cryptocurrency reportedly in the works from Reliance Industries As on that date, there were at least 22 apps which had JioCoin in their name available for download on the Play Store.

What will  Fake Jiocoin App do

Once user Install it on their Android phone, its asks personal information such as username, mobile number, and email address.

JioCoin

Also, it fooling users that they are in the queue for getting Jiocoin but actually nothing will have happened behind the scene.

According to QuickHeal, One of these fake apps (that goes by the name Jio Coin) has been downloaded between 10,000 and 50,000 times. The app’s icon looks similar to the official Jio icon and the developer goes by the name ‘Reliance Digital’ (not Reliance Digital).

Mitigation:

  • Check an app’s description before you download it.
  • Check the app developer’s name and their website.If the name sounds strange or odd, you have reasons to suspect it.
  • Go through the reviews and ratings of the app. But, note that, these can be fake too.
  • Avoid downloading apps from third-party app stores.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...