Wednesday, September 18, 2024
HomeCryptocurrency hackBeware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform -...

Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin

Published on

Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest in this fake platform.

Reliance Jio Infocomm is one of the biggest telecommunication firms in India it is a wholly owned subsidiary of Reliance Industries.

Cyber Criminals uploaded Fake Cryptocurrency Apps under JioCoin name into Google Play store and compromising users to invest in it.

- Advertisement - EHA
JioCoin

Since Jio holding Million of customers in India, this fraudulent attempts by unscrupulous persons to misguide the public in the name of Jio to steal the user’s information.

Also Read 17-year-old schoolboy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords

According to Jio “Any such apps using the JioCoin name are fake and people are advised to refrain from dealing with any of them.

Reliance Jio takes a serious note of such fraudulent attempts” Also, A Website Claimed that JioCoin, a cryptocurrency reportedly in the works from Reliance Industries As on that date, there were at least 22 apps which had JioCoin in their name available for download on the Play Store.

What will  Fake Jiocoin App do

Once user Install it on their Android phone, its asks personal information such as username, mobile number, and email address.

JioCoin

Also, it fooling users that they are in the queue for getting Jiocoin but actually nothing will have happened behind the scene.

According to QuickHeal, One of these fake apps (that goes by the name Jio Coin) has been downloaded between 10,000 and 50,000 times. The app’s icon looks similar to the official Jio icon and the developer goes by the name ‘Reliance Digital’ (not Reliance Digital).

Mitigation:

  • Check an app’s description before you download it.
  • Check the app developer’s name and their website.If the name sounds strange or odd, you have reasons to suspect it.
  • Go through the reviews and ratings of the app. But, note that, these can be fake too.
  • Avoid downloading apps from third-party app stores.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in...

Discord Announces End-to-End Encryption for Audio & Video Chats

Discord has introduced end-to-end encryption (E2EE) for audio and video chats.Known as the...

Threat Actor Allegedly Selling Bharat Petroleum Database

A threat actor has allegedly put up for sale a database belonging to Bharat...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger...

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a...