How to identify fake sites like the "Jupiter Allocation Scam"

Phishing/Scam

Also Known As: Jupiter Allocation drainer scam

Damage level:

Get free scan and check if your device is infected.

Remove it now

To use full-featured product, you have to purchase a license for Combo Cleaner. Seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

What is the "Jupiter Allocation Scam"?

During an investigation of dubious websites, our researchers discovered jupag[.]pro - a page built to mimic the legitimate Jupiter platform. The site falsely claims that visitors have frozen JUP token allocations waiting to be claimed. In reality, it is a cryptocurrency drainer designed to steal digital assets from anyone who connects a wallet.

Jupiter Allocation Scam

IMPORTANT NOTE: We do not review crypto projects, please do your own research when investing money.

Federal Trade Commission (FTC) states that since the start of 2021, more than 46,000 people have reported losing over $1 billion in crypto to scams – that's about one out of every four dollars reported lost, more than any other payment method.

"Jupiter Allocation Scam" in detail

The legitimate Jupiter platform (jup.ag) is a leading decentralized exchange aggregator built on the Solana blockchain. It routes trades across multiple liquidity sources to secure the best available prices, and JUP is its native governance token.

The fraudulent site at jupag[.]pro copies the visual appearance of the real Jupiter website. It claims that JUP token allocations are already assigned to eligible wallets but are "frozen," and that users must complete a one-time on-chain claim to unlock them.

To add urgency, the page displays fabricated statistics - 34,385 eligible wallets and 50 million tokens for distribution - alongside a countdown timer implying the claim window is nearly closed. These figures are invented and designed to rush visitors into acting without thinking.

Visitors are guided through three steps: connect a wallet, submit an allocation transaction, then receive the allocation. Approving the prompted transaction actually means signing a malicious smart contract. That contract gives attackers ongoing permission to initiate transfers out of the victim's wallet.

Since blockchain transactions cannot be reversed, stolen cryptocurrency is unrecoverable once transferred. Victims have no recourse after the drainer moves funds to the attacker's address.

It is essential to confirm a platform is genuine before connecting a cryptocurrency wallet or approving any transaction. The official Jupiter exchange is only accessible at jup.ag.

Threat Summary:
Name Jupiter Allocation drainer scam
Threat Type Phishing, Scam, Social Engineering, Fraud, Cryptocurrency Drainer
Fake Claim Users have frozen JUP token allocations that can be unlocked by submitting an on-chain allocation transaction
Disguise Legitimate Jupiter (jup.ag) token allocation program
Related Domain(s) jupag[.]pro
Threat Status (jupag[.]pro) PCrisk Website Scanner Results
Symptoms Unofficial domain, lack of official verification, unrealistic claims, too good-to-be-true promises
Distribution methods Fake social media accounts, deceptive websites, rogue online advertisements
Damage Cryptocurrency theft
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.

Download Combo Cleaner

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Conclusion

jupag[.]pro is a fraudulent site impersonating the legitimate Jupiter platform. Its purpose is to trick visitors into signing a malicious smart contract that drains their cryptocurrency wallets. Anyone who interacts with the wallet connection prompt risks losing their digital assets permanently.

Many deceptive sites like jupag[.]pro exist, often closely replicating legitimate cryptocurrency platforms to appear credible. They lure visitors with promises of free tokens or locked allocations waiting to be claimed. Anyone who falls for these scams risks losing their cryptocurrency. Some examples of similar scams are "Avantis ($AVNT) Airdrop", "$PENDLE Voting Rewards", and "Avantis ($AVNT) Airdrop".

How did I open a scam website?

Scammers commonly promote fake allocation and airdrop pages via stolen or fabricated social media accounts on platforms such as X (formerly Twitter) and Discord. They often take over accounts belonging to prominent figures or well-known crypto projects to lend their pages a false sense of credibility. Malicious ad networks found on torrent sites and unofficial streaming services are also used.

Users can also land on pages like this by clicking links in phishing emails, interacting with misleading pop-ups on unreliable websites, or through adware-generated redirects. Granting notification permissions to dubious sites is another route scammers use to reach users.

How to avoid visiting scam pages?

Keep your operating system and all installed software up to date. Only download programs and browser extensions from official sources. Treat unexpected emails containing links or attachments with caution, especially those claiming to offer token rewards, exclusive platform access, or urgent financial opportunities.

Avoid clicking suspicious ads, pop-ups, or links on unfamiliar websites. Do not grant notification permissions to sites that seem untrustworthy. Always check that the URL in your browser matches the official domain before connecting a wallet or signing any transaction. If your computer is already infected with unwanted apps, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.

The appearance of the "Jupiter Allocation Scam" (GIF):

Jupiter Allocation Scam appearance (GIF)

The official Jupiter website (jup.ag):

Jupiter Allocation Scam real website (jup.ag)

Instant automatic malware removal:

Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:

DOWNLOAD Combo Cleaner

By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Quick menu:

How to identify a pop-up scam?

Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.

While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.

Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:

  • Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
  • Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
  • Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
  • Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
  • Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.

Example of a pop-up scam:

Example of a pop-up scam

How do pop-up scams work?

Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.

Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.

How to remove fake pop-ups?

In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.

In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.

How to prevent fake pop-ups?

To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.

To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.

What to do if you fell for a pop-up scam?

This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.

  • If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
  • If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
  • If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
  • Help other Internet users: report Internet scams to Federal Trade Commission.

Frequently Asked Questions (FAQ)

What is a fake crypto airdrop?

These scams promise free tokens or cryptocurrency to eligible users. They are typically presented as legitimate promotions from well-known platforms, making them appear trustworthy at first glance.

What is the purpose of a crypto scam?

These scams are designed to steal cryptocurrency. They do this by tricking users into signing malicious smart contracts, connecting wallets to drainer scripts, or revealing recovery phrases that hand scammers full control of their wallets.

Why do I encounter fake websites?

Fraudulent pages like this are spread through hijacked social media accounts, phishing emails, rogue advertising networks, and misleading pop-ups or links on unsafe websites. Adware installed on a device can also redirect users to such pages.

Will Combo Cleaner protect me from scams?

Combo Cleaner can scan websites you visit and flag those associated with scams or malicious activity. When a suspicious site is detected, Combo Cleaner warns you and blocks access, reducing your risk of falling victim to threats like this.

Share:

facebook
X (Twitter)
linkedin
copy link
Tomas Meskauskas

Tomas Meskauskas

Expert security researcher, professional malware analyst

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats.

▼ Show Discussion

PCrisk security portal is brought by a company RCS LT.

Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

Donate