Friday, March 29, 2024

Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin

Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest in this fake platform.

Reliance Jio Infocomm is one of the biggest telecommunication firms in India it is a wholly owned subsidiary of Reliance Industries.

Cyber Criminals uploaded Fake Cryptocurrency Apps under JioCoin name into Google Play store and compromising users to invest in it.

JioCoin

Since Jio holding Million of customers in India, this fraudulent attempts by unscrupulous persons to misguide the public in the name of Jio to steal the user’s information.

Also Read 17-year-old schoolboy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords

According to Jio “Any such apps using the JioCoin name are fake and people are advised to refrain from dealing with any of them.

Reliance Jio takes a serious note of such fraudulent attempts” Also, A Website Claimed that JioCoin, a cryptocurrency reportedly in the works from Reliance Industries As on that date, there were at least 22 apps which had JioCoin in their name available for download on the Play Store.

What will  Fake Jiocoin App do

Once user Install it on their Android phone, its asks personal information such as username, mobile number, and email address.

JioCoin

Also, it fooling users that they are in the queue for getting Jiocoin but actually nothing will have happened behind the scene.

According to QuickHeal, One of these fake apps (that goes by the name Jio Coin) has been downloaded between 10,000 and 50,000 times. The app’s icon looks similar to the official Jio icon and the developer goes by the name ‘Reliance Digital’ (not Reliance Digital).

Mitigation:

  • Check an app’s description before you download it.
  • Check the app developer’s name and their website.If the name sounds strange or odd, you have reasons to suspect it.
  • Go through the reviews and ratings of the app. But, note that, these can be fake too.
  • Avoid downloading apps from third-party app stores.
Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles