Malicious tools have now become widely available and fraudsters are conducting attacks on a much larger scale than ever before.
Emulators are hardware or software applications that simulate mobile devices on desktops to conduct mass scripted attacks
App cloning involves running multiple instances of the same app to create multiple device identities
App tampering is a fraud technique that involves modifying app source codes to perform illicit functions
Device tampering involves changing device attributes to generate a disposable device identity
Malicious users will use GPS spoofers to falsify their location data to mask certain behaviors
IP masking involves disguising IP addresses using VPNs to bypass geo-restrictions