Monday, November 4, 2024
HomeCryptocurrency hackBeware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform -...

Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin

Published on

Malware protection

Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest in this fake platform.

Reliance Jio Infocomm is one of the biggest telecommunication firms in India it is a wholly owned subsidiary of Reliance Industries.

Cyber Criminals uploaded Fake Cryptocurrency Apps under JioCoin name into Google Play store and compromising users to invest in it.

- Advertisement - SIEM as a Service
JioCoin

Since Jio holding Million of customers in India, this fraudulent attempts by unscrupulous persons to misguide the public in the name of Jio to steal the user’s information.

Also Read 17-year-old schoolboy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords

According to Jio “Any such apps using the JioCoin name are fake and people are advised to refrain from dealing with any of them.

Reliance Jio takes a serious note of such fraudulent attempts” Also, A Website Claimed that JioCoin, a cryptocurrency reportedly in the works from Reliance Industries As on that date, there were at least 22 apps which had JioCoin in their name available for download on the Play Store.

What will  Fake Jiocoin App do

Once user Install it on their Android phone, its asks personal information such as username, mobile number, and email address.

JioCoin

Also, it fooling users that they are in the queue for getting Jiocoin but actually nothing will have happened behind the scene.

According to QuickHeal, One of these fake apps (that goes by the name Jio Coin) has been downloaded between 10,000 and 50,000 times. The app’s icon looks similar to the official Jio icon and the developer goes by the name ‘Reliance Digital’ (not Reliance Digital).

Mitigation:

  • Check an app’s description before you download it.
  • Check the app developer’s name and their website.If the name sounds strange or odd, you have reasons to suspect it.
  • Go through the reviews and ratings of the app. But, note that, these can be fake too.
  • Avoid downloading apps from third-party app stores.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger...

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a...