Malicious Tools

Malicious tools have now becomes widely available, and fraudsters are conducting attacks on a much larger scale than ever before.

Emulators

Simulating virtual mobile devices on desktops to conduct mass scripted attacks

App Cloning

Running concurrent instances of the same app to create multiple device identities

App Tampering

Modifying app source codes to perform illicit functions

Device Tampering

Changing device attributes to generate a disposable device identity

GPS Spoofing

Falsifying location data to mask certain behaviors

IP Masking

Masking IP addresses with VPNs to bypass geo-restrictions