Friday, June 14, 2024

Apple Blocked Over $2 Billion in Fraudulent Transactions & 1.7 Malicious Apps

Apple published a report claiming that they prevented around $2 billion of potentially fraudulent transactions in 2022 and rejected around 1.7 million app submissions as they failed to meet the App Store’s High Standard of Privacy.

Apple has been giving more preference to the users’ privacy by creating many rules for applications and giving more data control for its users.

App Store, the application downloading platform for Apple users, was launched in 2008. Over the years, around 1.6 million apps have been in the App Store. The platform has also attracted several developers to create applications for the benefit of the users.

Account Fraud

As per Apple’s report, they have terminated around 802,000 developer accounts that were involved in fraudulent activities in 2021. However, the numbers dropped in half in 2022, with 428,000 suspended accounts.

They have also rejected around 105,000 Apple Developer Program for suspicious account activities preventing the submission of fraudulent apps.

Concerning privacy violations and security issues, Apple blocked around 57,000 apps in 2022. Along with this, Apple has also disabled over 282 million customer accounts relating to abusive activities.

App Review

Every application that is submitted to the App Store is reviewed by the App Review team. During the application development, Xcode scans the application and checks for the requirements to meet the app store.

Source: Apple

The App review team will check for Apple’s standards of quality and safety of the application and ensure they meet the criteria. 

Apple stated that, “On average, the team reviews over 100,000 app submissions a week, with nearly 90 percent of them receiving a review within 24 hours. Having reviewed more than 6.1 million app submissions in 2022, App Review helped more than 185,000 developers publish their very first app on the App Store, and made over 20,000 phone calls to developers to help them diagnose and resolve issues that led to an app submission rejection.”

Ratings and Reviews

Reviews play a major role in the application installation by the user. Several fraud reviews and bot reviews were used on applications to increase their popularity and legitimacy.

In 2022, Apple blocked over 147 million fraudulent ratings and reviews on the App Store 2022, when nearly 1 billion ratings and reviews were processed.

Payment and Credit Card Fund

Apple supports nearly 195 local payment methods and 44 currencies. They claimed they blocked around 714,000 fraudulent accounts blocking nearly $2B transactions in 2022. Stolen credit cards accounted for nearly 3.9 million.

Apple has invested in secure payment technologies like Apple Pay and StoreKit for securing users’ financial information.

They never share the credit card numbers with the merchants, preventing a risk factor in the payment transaction process. Apple has published a complete report on this.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles