A fake “Free 25 GB Jio data” offer has been making the rounds recently. The link in the SMS: http[:]//tiny.cc/Jio-4G expands to a shared Android Package (APK) file over public.boxcloud.com. The APK has 10 activities, 3 services and 1 receiver, in total.
When a victim clicks on the link, the app requests the following permissions during the installation:
- android.permission.READ_PHONE_STATE: Allows the app to access the victim’s phone state, including the phone number, cellular network information, status of ongoing calls, and a list of any PhoneAccounts registered on the device.
- android.permission.ACCESS_FINE_LOCATION: Allows the app to access precise location.
- android.permission.ACCESS_COARSE_LOCATION: Allows the app to access approximate location.
- android.permission.FOREGROUND_SERVICE: Allows the app to use Service.startForeground.
- android.permission.READ_CONTACTS: Allows an app to read the victim’s phone contacts data.
- android.permission.SEND_SMS: Allows the app to send SMS messages
- android.permission.ACCESS_WIFI_STATE: Allows the app to access information about Wi-Fi networks.
- android.permission.ACCESS_NETWORK_STATE: Allows the app to access information about networks.
- android.permission.RECEIVE_BOOT_COMPLETED: Allows the app to receive the Intent.ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting.
- com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE: Allows the app to tell if their installation was launched from an ad in Privacy Browser Free.