Story image

Why the growing threat of scam apps demands attention

31 Jan 2019

Many app developers bombard users with unwanted popups and steal email addresses for targeted advertising. However, the effects of unethical online advertising and app management can be felt much deeper. Users need to fully verify any apps they install or download to avoid the ramifications of shoddy apps and advertising scams, according to ESET. 

ESET senior research fellow Nick FitzGerald says, "At the end of last year, fake fitness-tracking apps scammed multiple users into losing money via a payment mechanism which linked to users’ credit and debit cards connected to Apple accounts. 

“This should signal to consumers that installing and downloading apps and features online should only be done with the utmost precaution.”

"Downloading a fake app can open users’ devices and, consequently, networks, up to a range of dangerous implications, including data breaches and bank account depletion." 

ESET recommends five ways users can verify the validity of online apps, and improve the app ecosystem: 

1. Be aware that reviews can be misleading. Many conscientious iOS and Android users refer to reviews in the Apple App Store or Google Play before downloading apps. While the reviews section can often indicate the quality of an app, some reviews can be too old to rely on, or even deliberately posted by scam app developers themselves to fool potential customers. 

When reading reviews, consumers should look to see that comments are recent and steer clear of apps with reviews using vague or nonsensical language, or multiple comments with repeated content. Look out for comments belonging to profiles with similar usernames, or profiles that appear phoney and unrealistic. It’s a good idea to reorder the ranking options to gain a more balanced picture and look to the reviews deemed ‘most critical’ first. 

2. Be patient. It’s wise to avoid rushing into purchasing or downloading an app as soon as it’s released. Users should take a few days to wait for reviews to develop, and research what other users are saying. When it comes to safety, patience is key. 

3. Be aware of valid functionality. Users should learn the extent to which their devices operate, to better spot scams which require certain identification methods. For example, fitness tracking apps will never be able to use a user’s fingerprint scan to access a user’s calorie data or nutrition information, so an app requiring fingerprint scans for this purpose is likely bogus. 

Likewise, if an app requests information or permissions upon download that it simply doesn’t need to do its job, ESET advises users to steer clear. A flashlight app doesn’t require users’ email addresses or phone numbers to do its job, nor do most downloadable games. 

4. Dig deeper. There is a range of ways users can find evidence that an app might not be trustworthy. ESET recommends users search app developers’ names and research any past apps they’ve uploaded to find historical reviews or articles which might reveal critical information. 

Users can also Google the app developer’s name alongside the word ‘scam’ to turn up more specific results. 

5. Make a difference. If users are unfortunate enough to have downloaded an untrustworthy app, they should act immediately. Users can contact the App Store or their financial institutions and request a refund. 

Users can also report fraudulent apps to the App Store or Google Play, and leave critical reviews on the app developer’s content. This can help other users avoid making the same mistakes, and hopefully work to keep dodgy apps at bay.

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.