Malicious tools have now becomes widely available, and fraudsters are conducting attacks on a much larger scale than ever before.
Simulating virtual mobile devices on desktops to conduct mass scripted attacks
Running concurrent instances of the same app to create multiple device identities
Modifying app source codes to perform illicit functions
Changing device attributes to generate a disposable device identity
Falsifying location data to mask certain behaviors
Masking IP addresses with VPNs to bypass geo-restrictions