Discover Key Insights on the Global Regulatory Landscape of Anti-Money Laundering READ OUR WHITEPAPER

BlogBlogs7 Scamming Apps to Avoid: Protect Your Finances In 2024

7 Scamming Apps to Avoid: Protect Your Finances In 2024

Think your smartphone is secure? In 2023 alone, scamming apps caused over $3.4 billion in financial losses across the United States, according to the FBI’s Internet Crime Report[1].

As mobile payment apps and digital wallets become increasingly popular, cybercriminals are creating sophisticated scam apps that target unsuspecting users. These malicious applications range from fake investment platforms to fraudulent banking apps, all designed to steal sensitive financial information and drain bank accounts.

⚡ Key Takeaways

  • Cybercriminals are increasingly using sophisticated techniques to create fake apps that mimic legitimate platforms, targeting users with investment scams, fraudulent banking apps, and deceptive payment schemes.
  • These malicious apps have resulted in billions of dollars in losses worldwide, with victims losing money to investment scams, cryptocurrency fraud, phishing attacks, and other fraudulent activities.
  • To protect oneself, it’s crucial to download apps from official stores, verify app authenticity, enable strong authentication, regularly monitor accounts, and be wary of unrealistic offers and urgent requests.

Fake Investment Apps

Investment app scams have emerged as one of the most sophisticated digital threats in 2024, with fraudsters creating increasingly convincing replicas of legitimate investment platforms[2]. These scamming apps exploit the growing popularity of mobile investing to target both novice and experienced investors alike.

Common Investment Scam Tactics

Fraudsters employ multiple sophisticated techniques to deceive potential victims. Their primary strategy involves creating fake investment apps that closely mirror legitimate platforms, often appearing on official app stores[3]. These applications utilize advanced social engineering methods, including:

  • Clone investment apps that duplicate legitimate platforms.
  • Ponzi and pyramid schemes disguised as investment opportunities.
  • Pump and dump schemes targeting cryptocurrency and penny stocks.
  • High-yield investment programs promising unsustainable returns.

Important
Scammers build trust through artificial account growth displays and initial small withdrawal approvals, gradually encouraging larger investments before disappearing with victims’ funds.

Investment App Red Flags

Investors should remain vigilant for these critical warning signs that often indicate a fraudulent investment app:

  • Unrealistic Guarantees: Claims of guaranteed profits or consistently high returns regardless of market conditions.
  • Pressure Tactics: Urgent demands for quick investment decisions.
  • Verification Issues: Missing or suspicious registration documentation.
  • Technical Red Flags: Apps starting with HTTP instead of HTTPS.
  • Social Manipulation: Unsolicited investment advice through social media or dating apps.

Financial Losses from Investment Apps

The financial impact of investment app scams has reached alarming levels. In 2023, investors lost an estimated $2 billion to various investment scams, including rug pulls and fraudulent platforms. According to the Department of Financial Protection and Innovation, 87% of reported investment scams involved fraudulent trading platforms or websites[4].

These losses often occur through a gradual process where victims are encouraged to make increasingly larger investments. Scammers create artificial profits on their platforms, leading victims to believe their investments are growing successfully. When investors attempt to withdraw significant amounts, they discover their accounts are frozen or the entire platform has vanished.

The sophistication of these scams has increased significantly, with fraudsters now employing deepfake videos and impersonating well-known investment professionals to establish credibility. Many victims report being unable to recover their funds, as these fraudulent operations often operate across international borders, making law enforcement intervention challenging[5].

Fraudulent Crypto Trading Apps

Cryptocurrency trading platforms have become prime targets for sophisticated scammers, with fraudulent apps causing over $3.9 billion in losses during 2023 alone[6]. These malicious applications represent a growing threat in the digital finance landscape, combining social engineering with technical deception.

Crypto App Scam Methods

Cybercriminals deploy multiple sophisticated techniques to execute cryptocurrency fraud through mobile applications. The most prevalent method involves creating clone apps that perfectly mimic legitimate cryptocurrency exchanges. These applications often appear in official app stores, complete with fake reviews and ratings.

Scammers frequently utilize “pig butchering” schemes, where victims are gradually convinced to make increasingly larger investments through fraudulent platforms. The process typically begins with small successful withdrawals to build trust, followed by larger deposits that become impossible to retrieve.

Warning Signs of Fake Crypto Apps

Users should remain vigilant for these critical indicators of fraudulent cryptocurrency applications:

  • Unrealistic Returns: Promises of guaranteed profits or automated trading success.
  • Pressure Tactics: Urgent demands for immediate deposits or investments.
  • Missing Compliance: Absence of KYC (Know Your Customer) requirements.
  • Poor Security: Lack of two-factor authentication options.
  • Suspicious Addresses: No physical business address or regulatory information.
  • Communication Issues: Unresponsive customer service or support only via messaging apps.

How to Verify Legitimate Crypto Apps

Following these essential steps can help users identify legitimate cryptocurrency trading applications:

  1. Verify Registration Status
    • Check if the platform is registered with FinCEN.
    • Confirm state-level cryptocurrency business registration.
    • Verify presence on legitimate app stores.
  2. Examine Security Features
    • Look for mandatory KYC processes.
    • Confirm presence of strong authentication methods.
    • Verify SSL certification and secure connections.
  3. Research Platform History
    • Review legitimate third-party evaluations.
    • Check for regulatory compliance history.
    • Investigate company background and team members.

The legitimacy of a cryptocurrency trading platform can often be determined by its approach to regulatory compliance[7]. Legitimate exchanges invest heavily in security measures and maintain transparent operations, while fraudulent apps typically avoid regulatory oversight and proper security protocols.

Note
Recent investigations reveal that 32% of cryptocurrency scams involve the trading of digital assets for goods or services, while 23.4% relate to fraudulent investment opportunities through mobile applications[8]. These statistics underscore the importance of thorough verification before engaging with any cryptocurrency trading platform.

Phishing Banking Apps

The FBI has identified banking app phishing as “one of the fastest-growing sectors of smartphone-based fraud,” with cybercriminals deploying increasingly sophisticated techniques to compromise financial data. These malicious applications have evolved beyond simple login theft to incorporate advanced Progressive Web Applications (PWAs) that can bypass traditional security measures.

Banking App Scam Techniques

Modern banking app scams utilize multiple sophisticated approaches to target unsuspecting users. Cybercriminals frequently employ Progressive Web Applications that can be installed directly from browsers, circumventing the security protocols of official app stores[9]. These fraudulent applications employ several deceptive tactics:

  • Overlay Attacks: Creating pop-up windows that mimic legitimate bank login pages.
  • SMS-Based Distribution: Sending malicious hyperlinks through text messages.
  • Trojan Implementation: Embedding dormant malware that activates during legitimate banking sessions.
  • Credential Harvesting: Collecting login information through fake security verification processes.
  • Browser-Based Installation: Bypassing traditional App Store security measures.

How Phishing Apps Steal Data

The data theft process in banking app scams operates through a sophisticated multi-layer approach. When users install these fraudulent applications, the malware remains dormant until it detects access to legitimate banking services. The system then creates seamless overlays that capture sensitive information while redirecting users to actual banking platforms, making the theft nearly undetectable[10].

These applications can access multiple device features through browser APIs without triggering standard mobile OS permission prompts, including:

Critical Access Points:

  • Geolocation services.
  • Device camera functionality.
  • Microphone capabilities.
  • Contact information.
  • Stored passwords.

Protection Against Banking Scams

Users can implement several critical security measures to protect themselves against banking app fraud. Following these essential steps significantly reduces the risk of compromise:

  1. Download Verification:
    • Install apps exclusively from official app stores.
    • Verify developer credentials against bank information.
    • Check app ratings and legitimate user reviews.
  2. Authentication Security:
    • Enable two-factor authentication.
    • Utilize biometric security features.
    • Implement password-protected access.
  3. Ongoing Monitoring:
    • Review account statements regularly.
    • Enable transaction notifications.
    • Monitor for unauthorized access attempts.

Financial institutions recommend avoiding public Wi-Fi networks when accessing banking applications, as these networks can expose sensitive data to unauthorized parties. Instead, users should rely on secure cellular networks or verified private connections for financial transactions.

The implementation of proper security protocols becomes increasingly critical as 87% of reported banking fraud attempts involve some form of phishing or fraudulent application[11]. Users should remain particularly vigilant about unsolicited messages claiming to be from their financial institutions, as legitimate banks never request sensitive information through email or text messages.

Malicious Payment Apps

According to the Federal Trade Commission, Americans lost a staggering $210 million to payment app fraud last year, marking an unprecedented surge in mobile payment scams[12]. These losses stem from increasingly sophisticated scamming apps that exploit the convenience of peer-to-peer payment platforms.

Payment App Scam Types

Mobile payment platforms have become prime targets for fraudsters, with several distinct scam categories emerging. The most prevalent forms include:

  • Imposter Scams: Criminals impersonating friends, family, or legitimate organizations.
  • Reimbursement Fraud: False promises of refunds requiring immediate payment.
  • Emergency Assistance Schemes: Urgent requests for financial help from supposed loved ones.
  • Event Ticket Scams: Fake tickets sold through payment apps.
  • Pet Purchase Fraud: Nonexistent pets advertised with required advance payment.

Common Payment App Fraud

Fraudsters employ sophisticated social engineering tactics to execute payment app scams. A typical attack begins with the scammer gathering personal information through social media or data breaches. They then create convincing scenarios that exploit emotional triggers or urgency to prompt immediate action[13].

The most devastating aspect of payment app fraud lies in its irreversible nature. Once money is sent through these platforms, it becomes virtually impossible to recover, as these transactions are treated like cash transfers. Scammers often move funds quickly through multiple accounts, making tracing and recovery extremely challenging.

How We Can Help
Protect yourself against sophisticated fake apps, crypto scams, and phishing schemes. Learn how to spot red flags, secure your devices, and keep your financial information safe. Explore our resources to stay one step ahead of cyber threats.

Secure Payment App Usage

Implementation of robust security measures can significantly reduce the risk of payment app fraud. Users should follow these essential security protocols:

  • Transaction Protection
    • Link payment apps to credit cards instead of bank accounts.
    • Enable biometric authentication for all transactions.
    • Set up transaction notifications.
    • Implement personal identification numbers (PINs).
  • Critical Security Practices:
    • Only send payments to known and verified contacts.
    • Verify recipient information through trusted channels.
    • Conduct small test transactions for new recipients.
    • Avoid using payment apps for online shopping.
    • Disconnect payment apps from social media accounts.

Financial institutions recommend maintaining separate accounts for payment app transactions, limiting potential exposure to fraud. Users should regularly monitor their linked accounts and immediately report any suspicious activity to both the payment service provider and their financial institution[14].

Important
The implementation of these security measures becomes particularly crucial as scammers increasingly target mobile payment platforms with malicious software that can record keystrokes and capture sensitive financial information. By maintaining vigilant security practices and understanding common fraud patterns, users can significantly reduce their risk of falling victim to payment app scams.

Fake Dating Apps

Recent data from the Federal Bureau of Investigation reveals that romance scams through dating apps have resulted in losses exceeding $1 billion in 2023, making them one of the most financially devastating forms of mobile fraud[15]. These sophisticated scamming apps have evolved beyond simple catfishing schemes into complex operations that combine social engineering with financial exploitation.

Dating App Scam Patterns

Cybercriminals employ increasingly sophisticated methods to exploit dating app users. Modern romance scammers utilize automated scripts and AI-powered conversations to engage multiple potential victims simultaneously. Their tactics have evolved to include:

  • Profile Manipulation:
    • Stolen photos from social media.
    • Professional-looking biographical information.
    • Verification badge forgery.
    • Strategic location spoofing.
  • Behavioral Patterns:
    • Rapid emotional attachment.
    • Requests to move communication off-platform.
    • Consistent use of scripted responses.
    • Strategic targeting of specific demographics.

Financial Risks in Dating Apps

The financial implications of dating app scams extend far beyond direct monetary losses. Cybercriminals often employ a progressive approach to financial exploitation, beginning with small requests and escalating to larger demands. Recent investigations reveal that the average victim loses $2,000 within the first three months of contact[16].

Scammers frequently utilize sophisticated methods to extract funds, including:

  1. Investment Schemes: Convincing victims to invest in fraudulent cryptocurrency platforms.
  2. Emergency Scenarios: Creating urgent situations requiring immediate financial assistance.
  3. Business Opportunities: Presenting fake joint venture proposals.
  4. Gift Card Requests: Soliciting digital gift cards as untraceable payment methods.

Dating App Safety Measures

Protection against dating app fraud requires a comprehensive approach to digital security. Users should implement these essential safety protocols:

  • Identity Verification:
    • Utilize platform verification features.
    • Conduct reverse image searches.
    • Cross-reference social media profiles.
    • Verify professional credentials.

Modern dating platforms have introduced advanced security features, including AI-powered behavior analysis and real-time threat detection[17]. These systems can identify suspicious patterns and potential scammers before they target users. However, personal vigilance remains crucial.

The implementation of proper security measures becomes particularly critical as scammers increasingly utilize sophisticated tools to bypass traditional protection mechanisms. Users should maintain strict privacy settings and never share financial information, regardless of the perceived relationship development stage.

Financial institutions recommend creating separate accounts for dating app transactions and implementing strict spending limits. This approach helps contain potential losses and provides an additional layer of security against sophisticated scamming operations that may attempt to access linked banking information.

By maintaining vigilant security practices and understanding common fraud patterns, users can significantly reduce their risk of falling victim to dating app scams while safely engaging with legitimate users on these platforms.

Counterfeit Shopping Apps

Local Circles, a community media platform, reports that one in five products sold through e-commerce apps is counterfeit, leading to substantial financial losses and security risks for consumers. The proliferation of counterfeit shopping apps has created an unprecedented challenge in the digital marketplace, with fraudsters leveraging sophisticated techniques to deceive unsuspecting shoppers.

Shopping App Fraud Tactics

Cybercriminals employ multiple sophisticated approaches to execute shopping app fraud. These malicious applications utilize advanced deception techniques that exploit consumers’ trust in established e-commerce platforms. Common tactics include:

  • Brand Impersonation: Creating clone apps that mirror legitimate retailers.
  • Price Manipulation: Offering unrealistic discounts to lure customers.
  • Data Harvesting: Collecting personal and financial information.
  • Subscription Traps: Hidden recurring charges after initial purchase.
  • Service Impersonation: Fake customer service communications.
  • Payment Redirection: Routing transactions through unauthorized channels.

The sophistication of these fraudulent operations has increased significantly, with scammers now employing artificial intelligence and machine learning to create more convincing counterfeit applications. Recent investigations reveal that 40% of shopping app scams originate from social media advertisements, particularly on platforms like Facebook and Instagram[18].

Identifying Fake Shopping Apps

Consumers must remain vigilant for specific indicators that often reveal counterfeit shopping applications. These warning signs have become increasingly subtle as scammers refine their techniques. Critical identification markers include:

  1. Application Verification:
    • Suspicious developer names or credentials.
    • Recent publication dates with numerous downloads.
    • Inconsistent branding elements.
    • Poor grammar or spelling errors.
    • Unusual permission requests.
    • Missing or incomplete privacy policies.

The legitimacy of shopping apps can often be determined through their approach to data security. Legitimate retailers invest heavily in secure payment processing and maintain transparent privacy policies, while fraudulent apps typically avoid implementing proper security protocols[19].

Shopping App Security Tips

Protection against counterfeit shopping applications requires a comprehensive approach to digital security. Users should implement multiple layers of protection to safeguard their financial information and personal data.

Essential Security Measures:

  • Utilize credit cards instead of debit cards for enhanced protection.
  • Enable two-factor authentication for all shopping accounts.
  • Verify app authenticity through official store listings.
  • Monitor transaction histories regularly.
  • Maintain separate credit cards for online shopping.
  • Implement strong, unique passwords for each platform.

Financial institutions recommend designating specific credit cards solely for online shopping transactions, limiting potential exposure to fraud. This approach provides an additional layer of security, as credit card companies typically limit liability to USD 50.00 for unauthorized charges.

The implementation of proper security protocols becomes increasingly critical as scammers develop more sophisticated methods of bypassing traditional protection mechanisms. Recent data indicates that 66% of consumers would permanently abandon an online retailer after experiencing a security breach, highlighting the importance of vigilant security practices[20].

Advanced Protection Strategies include:

  • Regular security software updates.
  • Verification of SSL certificates.
  • Careful review of app permissions.
  • Avoidance of public Wi-Fi for shopping.
  • Implementation of secure password managers.
  • Regular account activity monitoring.

Example
The rise of counterfeit shopping apps has prompted increased regulatory scrutiny, with governments worldwide implementing stricter oversight of e-commerce platforms. China’s recent legislation holds e-commerce platforms jointly accountable for counterfeit sales, imposing fines of up to RMB 2 million for serious violations[21].

Fleeceware Apps

Research from Avast Security reveals a disturbing trend: fleeceware applications have generated over $400 million in fraudulent revenue through deceptive subscription practices[22]. These sophisticated scamming apps represent a growing threat in the mobile app ecosystem, targeting users through seemingly legitimate free trials that transform into expensive recurring charges.

Fleeceware Subscription Tricks

Fleeceware developers employ multiple deceptive tactics to trap users in costly subscription services. The most common approach involves offering a brief “free trial” period, typically lasting three days, followed by automatic enrollment in premium subscriptions costing up to $3,432 annually. These applications often provide minimal functionality while charging exorbitant fees[23].

Key Deception Mechanisms:

  • Automatic conversion from free trials to paid subscriptions
  • Excessive subscription fees hidden in terms and conditions
  • Continuation of charges after app uninstallation
  • Complicated cancellation procedures
  • Deceptive advertisements on social media platforms

The sophistication of these operations has increased significantly, with developers utilizing targeted advertising on platforms like Facebook, Instagram, and TikTok. These advertisements often feature misleading claims about “free installation” or “free downloads,” deliberately obscuring the substantial subscription costs that follow.

Hidden Fee Detection

Users must remain vigilant for specific warning signs that often indicate fleeceware applications. Recent investigations have identified several consistent patterns in how these applications conceal their true costs.

Critical Warning Signs:

  • Pricing Irregularities
    • Unusually short trial periods (less than 7 days)
    • Weekly billing cycles instead of monthly
    • Charges exceeding standard market rates
    • Multiple subscription tiers with unclear benefits
  • Technical Red Flags
    • Limited functionality compared to free alternatives
    • Excessive permission requests
    • Artificial review inflation
    • Minimal developer information
    • Non-responsive support channels

The Federal Trade Commission’s new “Click to Cancel” rule represents a significant step toward consumer protection, requiring sellers to make subscription cancellation as straightforward as the sign-up process. However, fleeceware developers continue to exploit loopholes and user inexperience.

Avoiding Subscription Traps

Protection against fleeceware requires a comprehensive approach to app installation and subscription management. Security experts recommend implementing these essential safeguards:

  1. Pre-Installation Verification
    • Research developer credentials thoroughly
    • Compare pricing with similar applications
    • Read recent user reviews carefully
    • Verify subscription terms explicitly
  2. Active Subscription Management
    • Document trial period start and end dates
    • Set calendar reminders for cancelation deadlines
    • Review bank statements regularly
    • Monitor subscription renewal notifications
  3. Security Implementation
    • Enable purchase authentication
    • Restrict in-app purchases
    • Implement parental controls
    • Maintain separate payment methods

The implementation of proper security measures becomes increasingly critical as fleeceware developers adopt more sophisticated techniques. Recent data indicates that 87% of fleeceware victims initially downloaded applications through legitimate app stores, highlighting the importance of vigilant screening even for seemingly trustworthy sources[24].

Advanced Protection Strategies include maintaining dedicated credit cards for app purchases, implementing strict spending limits, and regularly auditing active subscriptions through device settings. Users should pay particular attention to applications that advertise “free trials” or “premium features,” as these terms often signal potential fleeceware schemes.

Financial institutions recommend immediate action upon discovering unauthorized subscription charges. Users should:

  • Document all communication attempts with developers
  • Report fraudulent charges to payment providers
  • File complaints with relevant consumer protection agencies
  • Request chargeback investigations when appropriate

The sophistication of fleeceware operations continues to evolve, with developers now employing artificial intelligence to create more convincing user interfaces and marketing materials. These applications often target vulnerable demographics, including children and elderly users, through engaging advertisements and misleading promises of exclusive features.

Recent regulatory changes have prompted increased scrutiny of subscription-based applications, with both Google Play and Apple’s App Store implementing stricter guidelines for developers. However, the responsibility for protection ultimately rests with users, who must maintain vigilant security practices and thorough subscription management protocols.

What Is Your Digital Defense Strategy?

Mobile app scams have evolved into sophisticated operations causing billions in financial losses, with cybercriminals deploying increasingly deceptive tactics across multiple app categories. From investment platforms promising unrealistic returns to dating apps exploiting emotional vulnerabilities, these scams continue to adapt and evade traditional security measures.

Protection against these digital threats requires a multi-layered approach. Users must verify app authenticity through official stores, implement robust security measures like two-factor authentication, and maintain separate accounts for different financial activities. Regular monitoring of transactions, a careful review of app permissions, and skepticism toward unrealistic offers serve as crucial defensive measures.

The rising sophistication of scamming apps makes constant vigilance essential. While app stores and regulatory bodies work to combat fraudulent applications, users bear the primary responsibility for their digital security. Simple precautions like researching developers, reading user reviews, and understanding subscription terms can prevent significant financial losses.

Mobile app security demands proactive measures rather than reactive responses. Users should regularly audit installed applications, maintain updated security software, and stay informed about emerging scam tactics. These steps, combined with careful verification of financial transactions, create a strong defense against increasingly sophisticated mobile app threats.

References

[1] – IC3 – Scam Report 2023. https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf

[2] – PSR – Scamming Apps. https://www.psr.org.uk/our-work/app-scams/

[3] – FTC – What to know about Romance Scams. https://consumer.ftc.gov/articles/what-know-about-romance-scams

[4] – Kaspersky – Identifying and Avoiding Fake Apps. https://www.kaspersky.com/resource-center/preemptive-safety/identifying-and-avoiding-fake-apps?srsltid=AfmBOopigBradnrLPFT4uHCk4xS2zwwvFFSW8fZEZrx8dg-4_DSnzwAZ

[5] – InternationalAccountingBulletin – Most Common Crypto Currency Scams in 2024.  https://www.internationalaccountingbulletin.com/news/most-common-crypto-scams-in-2024-how-to-spot-them-and-protect-your-money/

[6] – CFTC – Spot Fraud Sites. https://www.cftc.gov/sites/default/files/2023-04/SpotFraudSites.pdf

[7] – CFTC – Watch Out for Digital Fraud. https://www.cftc.gov/LearnAndProtect/AdvisoriesAndArticles/watch_out_for_digital_fraud.html

[8] – Stripe – Six Types of Payment Fraud. https://stripe.com/resources/more/six-types-of-payment-fraud

[9] – FCC – More Consumers Adopt Payment Apps Scammers Follow. https://www.fcc.gov/more-consumers-adopt-payment-apps-scammers-follow

[10] – FDIC – Avoiding Scams and Scammers. https://www.fdic.gov/consumer-resource-center/2021-10/avoiding-scams-and-scammers

[11] – OCC – Phishing Attacks and Prevention. https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/phishing-attack-prevention.html

[12] – ScienceDirect – Common Frauds Apps and How To Avoid Them. https://www.sciencedirect.com/science/article/pii/S0167404823002973

[13] – GOV – Government Approach to Authorised Push Payment Scam Reimbursement. https://www.gov.uk/government/publications/government-approach-to-authorised-push-payment-scam-reimbursement/government-approach-to-authorised-push-payment-scam-reimbursement

[14] – Consumer – How to Avoid Scam? https://consumer.ftc.gov/articles/how-avoid-scam

[15] – Security – Romance Scams. https://www.security.org/digital-safety/scams/romance/

[16] – ScienceDirect – Emotional and financial costs of online dating scam. https://www.sciencedirect.com/science/article/pii/S2949791423000441

[17] – ConsumerFinance – What are Common Types of Scams? https://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/

[18] – Content-Science – Disinformation Roudup for Social Media and Shopping Scams. https://review.content-science.com/disinformation-roundup-social-media-shopping-scams-their-frequency-and-whats-being-done-to-combat-them/

[19] – Grants – Grant Scam Fruad Alert. https://www.grants.gov/learn-grants/grant-fraud/grant-scam-fraud-alerts.html

[20] – Security Magazine – Consumers Would Not Trust a Company Following A Data Breach. https://www.securitymagazine.com/articles/100296-66-of-consumers-would-not-trust-a-company-following-a-data-breach

[21] – TheDiplomat – Deceptive Practices and Countermeasures on Chinas Online Retail Platforms. https://thediplomat.com/2024/03/deceptive-practices-and-countermeasures-on-chinas-online-retail-platforms/

[22] – Avast – How To Spot Fleeceware. https://blog.avast.com/how-to-spot-fleeceware

[23] – UFDC Images – HIGHLANDS NEWS-SUN – University of Florida. http://ufdcimages.uflib.ufl.edu/AA/00/05/43/97/00558/02-26-2018.pdf

[24] – Cyberhoot – Malicious Fleeceware App Downloaded 600m Times. https://cyberhoot.com/blog/malicious-fleeceware-app-downloaded-600m-times/

Was this helpful?

Good job! Please give your positive feedback

How could we improve this post? Please Help us.

[Trainee] Astrid is one of Cellbunq’s latest add-ons to the team, she is currently undergoing a bachelor's degree in Artificial Intelligence at the Stockholm University of Technology (SIT). Connect With Her LinkedIn

Ready to enhance your onboarding?

Learn how Cellbunq can help you elevate your know your business (KYB) or know your customer (KYC) process. Our industry experts will get back to you within the day.

Google Reviews 4.5

Legal

Follow Us

Newsletter

Stay in the loop with the latest

Don't miss new updates on your email.

© 2024 · Cellbunq Systems AB Storgatan 4, 15330 Jarna, Sweden