Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Mobile Security

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

Christi Rogalski by Christi Rogalski
June 8, 2022
in Mobile Security, Privacy
0
Apple app store security fraud
13
SHARES
211
VIEWS
Share on FacebookShare on Twitter

Apple has recently released statistics on the number of fraudulent and untrustworthy transactions that have passed through the Apple App Store in 2021. In combination, they have stopped nearly $1.5 billion from getting into the hands of fraudsters who prey on unsuspecting users.

You might also like

Android is getting firmware level security improvements

New iOS and iPadOS update pushed to fix zero-day bugs

GIFs in messaging apps are tracking you

Fraudulent apps are designed to steal your money and personal data. They are often disguised as legitimate apps or services, but the truth is that they can hide behind a variety of different names.

The most common types of fraudulent transactions include:

  • Scams that claim to give you free gift cards for completing surveys or downloading an app.
  • Fake lotteries, sweepstakes, and contests require you to pay fees before claiming your prize.
  • Apps that charge you for premium features without providing any value in return.
  • Apps that ask for access to sensitive personal information, such as passwords, credit card numbers, and bank account information.

Apple’s Figures

In their report published on June 1, 2022, Apple has presented some striking numbers.

  • The App Store prevented over 1.6 million potentially risky and untrustworthy apps as well as updates from making users lose their hard-earned money.
  • They have rejected tens of thousands of apps that contained undocumented or hidden features.
  • More than 157,000 spam, copycat, and misleading apps were rejected from the App Store in 2021.
  • Over 343,000 apps were rejected on the grounds of privacy violations.
  • The App Store also prevented over 3.3 million stolen credit cards from making any purchases on the marketplace.

Apart from that, the App Store also permanently banned close to 600,000 accounts from transacting on their platform, they also mentioned the deactivation of 170 million fraudulent customer accounts. Apple also reports that it banned 118 million+ attempted fraud account creations and terminated 802,000+ fraud developer accounts.

 Apple App Store Fraud
Source: Apple

Stopping Fraudulent Apps and Transactions in their Tracks

Apple also mentions that they have access to historical data starting at the inception of the App Store. This allows them to better automate and apply manual tools which they process to weed out-attempted fraud.

Using tools that leverage machine learning, the App Store can quickly and reliably extract vast amounts of data which they check against new apps and app updates. This allows the platform to learn about an app’s potential violations and issues before they can do any harm.

Apple maintains, however, that it is the human review process that acts as the critical line of defense. According to the report, Apple has a policy where each submitted app must go through a human app review process to ensure that the guidelines are followed and all regulations regarding privacy, spam, and security are adhered to.

Ways Apps and Developers Defraud People

Three common ways exist in which apps and developers usually defraud people.

  • Third-party billing – This is the most common way fraudulent apps steal from users. The app will display ads and then charge the user’s credit card for them. In some cases, it may even charge for subscriptions that you did not intend to subscribe to.
  • In-app purchases – These are purchases made inside an app or game that are not required for gameplay but are used to customize your experience or progress through a level or mission faster. These purchases can be made with real money or virtual currencies that can be purchased with real money (such as “coins” or “credits”).
  • Malware downloads – This type of fraud involves downloading an app that appears legitimate, but actually contains malware designed to steal information from your device or install viruses onto it without your knowledge.
Source: Apple
Tags: App storeapplefraud
Share6Tweet3
Christi Rogalski

Christi Rogalski

Christi began her InfoSec carrier at the Illinois Institute of Technology where she received her Bachelor of Science degree in Applied Cybersecurity and Information Technology. Her passions include learning about new threats in the security world, investing, and playing with her dog, Pablo.

Recommended For You

Android is getting firmware level security improvements

by Paul Anderson
February 22, 2023
0
Android is getting firmware level security improvements

Android is the most widely used mobile operating system in the world, but it is also the most challenging to protect against evolving security threats. Google is working...

Read more

New iOS and iPadOS update pushed to fix zero-day bugs

by Kyle
February 17, 2023 - Updated on February 19, 2023
0
New iOS and iPadOS update pushed to fix zero-day bugs

Cybercriminals and "commercial" spyware developers frequently target iOS devices to carry out surveillance operations, data theft, and other nefarious actions. By identifying a weakness in Apple's iOS WebKit,...

Read more

GIFs in messaging apps are tracking you

by Christi Rogalski
July 19, 2022
0
GIFs in messaging apps are tracking you

Today, the dynamic moving image, GIF sent to a friend or colleague, perfectly expresses our emotions and lightens the mood of the receiver(s). However, several concerns have been...

Read more

Google Chrome exposes user extensions to fingerprinting

by Kyle
July 1, 2022
0
Google Chrome Extension fingerprinting source

Security researcher, z0ccc, has released a new tool that proves that Google Chrome extensions can be fingerprinted which allows tracking of its users online. Tracking users online is...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more
Next Post
Emotet Banking Trojan 2022

Emotet Banking Trojan Re-Emerges After Take Down by Law Enforcement

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.