Crypto scam app bypass security restrictions on Apple and Google app stores: Report
Cybercriminals operating crypto scam apps have found a way to bypass security protocols on Apple and Google official app stores to publish fraudulent apps, a report from Sophos cybersecurity shared. Threat actors are remotely changing content to make fake apps slide through the official review process of Apple and Google app stores to post apps which are then used to execute CryptoRom scams, also known as “pig butchering”. While earlier the scam was deployed from outside official app stores, scammers are now using remote content to provide codes that allow fraudulent apps to appear legitimate to app store reviewers, once the app is approved, they change the code that delivers the fake CryptoRom trading interface. Sophos observed that with the emergence of FinTech people the use of software tools has increased and with fraudulent apps bypassing official Apple and Google store reviews, victims are even more at risk.
Discover Related

Fake Apps & URLs: How Cybercriminals Manipulate Brands & How to Fight Back

App Store stopped over $2 billion in fraudulent transactions in 2022, Apple claims

Apple's App Store prevented over $2 billion in fraudulent transactions in 2022

Google Play scam apps downloaded more than 8 million times by Android users

Fake banking apps targeting victims in India, says cyber security company

Are banking apps risky? Tips on how to identify fake apps on the Google Play Store
