Company Details
jio
97,138
1,261,018
517
jio.com
1835
JIO_8407955
Completed

Jio Company CyberSecurity Posture
jio.comMake a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make India Digital. Chat on MyJio App: http://tiny.jio.com/chat1 Chat on WhatsApp: http://tiny.jio.com/LiveChat
Company Details
jio
97,138
1,261,018
517
jio.com
1835
JIO_8407955
Completed
Between 750 and 799

Jio Global Score (TPRM)XXXX

Description: The largest breach of personal data in Indian history involved the exposure of personal information belonging to around 120 million users of the Indian corporation Reliance Jio. Customers of Reliance Jio can now look for their identifying information by entering their Reliance Jio number into the Magicapk.com website. Although the website is no longer available, numerous users attested to the accuracy of the information. Names, email addresses, phone numbers, circle-Ids, SIM activation dates and times, and, for some users, Aadhaar numbers are among the stolen data. Reliance Jio issued a statement disputing the data theft and stating that it doesn't seem like the stolen data is real.
Description: India’s largest cell network Jio, a subsidiary of Reliance, launched its coronavirus self-test symptom checker in late March, just before the Indian government imposed a strict nationwide lockdown to prevent the further spread of the coronavirus. A security lapse exposed one of the symptom checker’s core databases to the internet without a password. The database contains millions of logs and records starting April 17 through to the time that the database was pulled offline. Although the server contained a running log of website errors and other system messages, it also ingested vast numbers of user-generated self-test data. Each self-test was logged in the database and included a record of who took the test — such as “self” or a relative, their age, and their gender. The data also included the person’s user agent, a small snippet of information about the user’s browser version, and the operating system often used to load the website properly but can also be used to track a user’s online activity. Some of the records also contained the user’s precise location, but only if the user allowed the symptom checker access to their browser or phone’s location data. Most of the location data were clustered around major cities, such as Mumbai and Pune. TechCrunch also found users in the United Kingdom and North America.
Description: Over 120 million Reliance Jio users' data appeared to have been compromised in what appeared to be India's biggest data breach, according to a bland website called magicapk. The website disclosed information like first and surname names, phone numbers, email addresses, circles, SIM activation dates, and even Aadhaar numbers. They investigated and assured to the customer that customer details cannot be shared without their consent.


No incidents recorded for Jio in 2025.
No incidents recorded for Jio in 2025.
No incidents recorded for Jio in 2025.
Jio cyber incidents detection timeline including parent company and subsidiaries

Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make India Digital. Chat on MyJio App: http://tiny.jio.com/chat1 Chat on WhatsApp: http://tiny.jio.com/LiveChat


Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

We advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. T
Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wi

Founded in 2004, OPPO is one of the world's leading innovators of smart devices. With operations in over 60 countries and regions, OPPO's more than 290,000 points of sales and 1,900 official service centers share the beauty of technology with users all over the world. To forward our vision of a bett

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and

Pakistan’s number one digital operator and the largest internet and broadband service provider with over 70 million subscribers nationwide. With a legacy of more than 27 years, Jazz maintains market leadership through cutting-edge, integrated technology, the strongest brands and the largest portfoli

T-Mobile US, Inc. (NASDAQ: TMUS) is America’s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobile’s customers benefit from its unmatched combination of value and quality, unwavering obsession with off

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public sh

Prazer, somos a Claro! Aqui, temos um grande time que faz tudo acontecer! É com o esforço e a dedicação de cada uma de nossas Pessoas que somos hoje referência no que fazemos, atuando unidos no nosso propósito, que é “Conectar para uma vida mais divertida e produtiva”. Somamos todas as tecnologias
.png)
Tech News News: Reliance Jio is offering its subscribers 18 months of free access to Google's Gemini 2.5 AI Pro model, a significant move to...
India's largest Marathi folk art festival, 'The Folk Aakhyaan,' is set to revive Maharashtra's rich traditions at Jio World Garden on...
Tech News News: Reliance Jio is offering 18 months of free Gemini 2.5 AI Pro access, valued at over Rs 35000, intensifying competition with...
National Cyber Security : As part of Special Campaign, the Legislative Department organized a special workshop on “National Cyber Security”
Airtel and Jio are leading India's telecom transformation by driving premium ARPU growth, aggressively expanding fixed and mobile broadband,...
The Department of Telecommunications (DoT) has finalised new cybersecurity rules aimed at combating cyber fraud, which will impact major...
India's government mandates telecom cybersecurity rules for digital services, allowing account suspensions and requiring phone verification...
Take this security awareness training quiz to test your knowledge of common cybersecurity threats and best practices, from secure file...
Reliance Jio has said in its comments on the draft national telecom policy that it wants to offer MNV services through mutual agreements.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Jio is http://www.jio.com.
According to Rankiteo, Jio’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, Jio currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Jio is not certified under SOC 2 Type 1.
According to Rankiteo, Jio does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Jio is not listed as GDPR compliant.
According to Rankiteo, Jio does not currently maintain PCI DSS compliance.
According to Rankiteo, Jio is not compliant with HIPAA regulations.
According to Rankiteo,Jio is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Jio operates primarily in the Telecommunications industry.
Jio employs approximately 97,138 people worldwide.
Jio presently has no subsidiaries across any sectors.
Jio’s official LinkedIn profile has approximately 1,261,018 followers.
Jio is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, Jio has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/reliance-jio-infocomm-ltd-234.
Yes, Jio maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jio.
As of November 27, 2025, Rankiteo reports that Jio has experienced 3 cybersecurity incidents.
Jio has an estimated 9,535 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Breach.
Title: Reliance Jio Data Breach
Description: Over 120 million Reliance Jio users' data appeared to have been compromised in what appeared to be India's biggest data breach.
Type: Data Breach
Title: Data Exposure of Jio's Coronavirus Self-Test Symptom Checker
Description: A security lapse exposed one of the symptom checker’s core databases to the internet without a password. The database contained millions of logs and records, including user-generated self-test data. Each self-test was logged in the database and included a record of who took the test, their age, gender, user agent, and sometimes precise location data if allowed by the user.
Type: Data Exposure
Attack Vector: Unsecured Database
Vulnerability Exploited: Lack of Password Protection
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: First and surname names, Phone numbers, Email addresses, Circles, Sim activation dates, Aadhaar numbers

Data Compromised: User-generated self-test data, User agent, Location data
Systems Affected: Symptom Checker Database

Data Compromised: Names, Email addresses, Phone numbers, Circle-ids, Sim activation dates and times, Aadhaar numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, , User-Generated Self-Test Data, User Agent, Location Data, , Names, Email Addresses, Phone Numbers, Circle-Ids, Sim Activation Dates And Times, Aadhaar Numbers and .

Entity Name: Reliance Jio
Entity Type: Telecommunications
Industry: Telecommunications
Location: India
Size: Large
Customers Affected: 120 million

Entity Name: Jio
Entity Type: Telecommunications
Industry: Telecommunications
Location: India
Size: Large

Entity Name: Reliance Jio
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: India
Customers Affected: 120 million

Type of Data Compromised: Personally identifiable information
Number of Records Exposed: 120 million
Sensitivity of Data: High
Personally Identifiable Information: first and surname namesphone numbersemail addressescirclesSIM activation datesAadhaar numbers

Type of Data Compromised: User-generated self-test data, User agent, Location data
Number of Records Exposed: Millions
Sensitivity of Data: Medium
Personally Identifiable Information: AgeGenderLocation Data

Type of Data Compromised: Names, Email addresses, Phone numbers, Circle-ids, Sim activation dates and times, Aadhaar numbers
Number of Records Exposed: 120 million

Source: magicapk

Source: TechCrunch
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: magicapk, and Source: TechCrunch.

Root Causes: Lack of Password Protection on Database
Most Significant Data Compromised: The most significant data compromised in an incident were first and surname names, phone numbers, email addresses, circles, SIM activation dates, Aadhaar numbers, , User-generated self-test data, User Agent, Location Data, , Names, Email addresses, Phone numbers, Circle-Ids, SIM activation dates and times, Aadhaar numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email addresses, first and surname names, Aadhaar numbers, Circle-Ids, email addresses, Phone numbers, SIM activation dates and times, User-generated self-test data, Location Data, phone numbers, SIM activation dates, User Agent, circles and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 240.0M.
Most Recent Source: The most recent source of information about an incident are TechCrunch and magicapk.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.