Wednesday, April 30, 2025
HomeCryptocurrency hackBeware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform -...

Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin

Published on

SIEM as a Service

Follow Us on Google News

Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest in this fake platform.

Reliance Jio Infocomm is one of the biggest telecommunication firms in India it is a wholly owned subsidiary of Reliance Industries.

Cyber Criminals uploaded Fake Cryptocurrency Apps under JioCoin name into Google Play store and compromising users to invest in it.

- Advertisement - Google News
JioCoin

Since Jio holding Million of customers in India, this fraudulent attempts by unscrupulous persons to misguide the public in the name of Jio to steal the user’s information.

Also Read 17-year-old schoolboy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords

According to Jio “Any such apps using the JioCoin name are fake and people are advised to refrain from dealing with any of them.

Reliance Jio takes a serious note of such fraudulent attempts” Also, A Website Claimed that JioCoin, a cryptocurrency reportedly in the works from Reliance Industries As on that date, there were at least 22 apps which had JioCoin in their name available for download on the Play Store.

What will  Fake Jiocoin App do

Once user Install it on their Android phone, its asks personal information such as username, mobile number, and email address.

JioCoin

Also, it fooling users that they are in the queue for getting Jiocoin but actually nothing will have happened behind the scene.

According to QuickHeal, One of these fake apps (that goes by the name Jio Coin) has been downloaded between 10,000 and 50,000 times. The app’s icon looks similar to the official Jio icon and the developer goes by the name ‘Reliance Digital’ (not Reliance Digital).

Mitigation:

  • Check an app’s description before you download it.
  • Check the app developer’s name and their website.If the name sounds strange or odd, you have reasons to suspect it.
  • Go through the reviews and ratings of the app. But, note that, these can be fake too.
  • Avoid downloading apps from third-party app stores.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

A newly disclosed vulnerability in Microsoft’s Telnet Server component is making headlines after researchers...

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security....

Anthropic Report Reveals Growing Risks from Misuse of Generative AI Misuse

A recent threat report from Anthropic, titled “Detecting and Countering Malicious Uses of Claude:...

Link11 brings three brands together on one platform with new branding

Link11 has fully integrated DOSarrest and Reblaze to become one of Europe's leading providers...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...