Cointime

Download App
iOS & Android

A Guide to Fake Apps: How to Spot and Avoid Them

Validated Venture

Main Takeaways

  • Fake applications are programs designed to mimic legitimate applications familiar to us.
  • Scammers will attempt to hide malicious software behind a fake app listing on third-party or official app stores.
  • Users should only download the Binance app from official channels, such as our website, the Google Play Store, or the Apple App Store.

Fake applications — programs designed to mimic legitimate applications familiar to us — are among today’s biggest cybersecurity threats.

Fake apps look just like the real thing, from the logo to the description. On the surface, they might have the same interface, services, and functionalities. Some even have repackaged source code from the official application.

But if you take a closer look, you may find malicious software spying on your phone activity or attempting to steal your information and assets. Scammers will disseminate fake applications through various methods, including third-party or counterfeit app stores, official app stores, and social engineering via emails or SMS messages.

Let’s first dive into two methods scammers use to disguise fake apps: imitation and repackaging.

Example 1: Imitation

Imitation, as the name implies, attempts to trick users by pretending to copy the official source with similar names, logos, and features. Below is an example of an imitation app trying to pass off as an official BNB Chain app.

Disclaimer: The contents of this image depict a fraudulent application that is not associated in any way or form with Binance.

Example 2: Repackaging

The second method, repackaging, is significantly more challenging to identify at first sight. Repackaged apps use the same metadata as the official version, including the name and icon, by modifying and repackaging the source code. The example below is a repackaged app posing as the official Binance app. You’ll notice it features the exact same logo.

Disclaimer: The contents of this image depict a fraudulent application that is not associated in any way or form with Binance.

The Different Types of Fake Apps and Their Dangers

  1. Ad bots. Fake apps will sometimes contain an obnoxious amount of unwanted ads that may even start appearing on your phone calendar or other places.
  2. Billing fraud. Scammers can use fake apps to automatically charge purchases to your phone bill without your consent.
  3. Botnet. Cybercriminals can use your phone as part of a DDoS (distributed denial of service) attack to mine cryptocurrency or send spam to other potential targets.
  4. Hostile content. Fake apps can include inappropriate content, such as hate speech, pornography, or violence, to name a few.
  5. Hostile downloaders. While they might not contain malicious code, fake apps can lead victims to download other malicious and unwanted software onto their devices.
  6. Phishing. Criminals can steal your login information using an interface designed to mimic the login menu of a legitimate application.
  7. Privilege escalation. This type of fake app will ask for elevated privileges, allowing criminals to disable your device’s core security functions.
  8. Ransomware. Designed to infect your device with ransomware, this type of fake app will lock you out of your data, encrypting and rendering it unreadable.
  9. Rooting. Rooting apps may contain code that disables your device’s built-in security and carries out harmful actions against your device.
  10. Spam. As the name implies, spam apps will send unsolicited messages to your contacts or involve your device in a mass email spam campaign.
  11. Spyware. Spyware apps send personal data to third parties without your consent. The data may include text messages, call logs, contact lists, email records, photos, browser history, GPS location, crypto addresses, and recovery phrases from other apps on your device.
  12. Trojan. Once installed, trojans may seem harmless on the outside — but in the background — they’re secretly performing malicious actions, such as harvesting personal data or sending premium SMS messages from your device without your knowledge.

Fake apps in the crypto space will often replace the addresses displayed on their interface’s deposit and withdrawal page. When the user initiates a transfer, their assets end up going to the scammer’s account. This is one of the most common ways crypto users lose their assets to fake apps.

As a general guideline, we suggest depositing or withdrawing a small amount as a test trial before initiating higher-value transactions.

How to Spot and Protect Yourself From Fake Apps

Look for these red flags before pressing download

  1. Distorted icon. Fake apps will try to imitate the official app store listing as much as possible. Don’t be deceived by distorted versions of the actual icon.
  2. Unnecessary permission agreement. Read the developer’s privacy policy before you download the app. Once installed, fake apps will often ask for unnecessary authorizations.
  3. Questionable reviews. Be suspicious of any app with either an excess of negative or positive reviews. 
  4. Grammar mistakes. Legitimate developers will put time into removing typos and errors in their app descriptions. Be wary if you spot an unreasonable number of grammatical errors in the app description.
  5. Low number of downloads. It’s improbable for widely-used legitimate apps to have very few downloads. For example, the Binance app has over 50 million downloads on the Google Play store alone.
  6. Fake developer information. Check the app’s developer information. Does it provide a legitimate company, email address, or website? If so, perform an online search to see if the information provided is related to the official organization.
  7. New release date. When was the app released? The app is likely fake if the listing shows a recent release date with many downloads and reviews. Legitimate apps with a high number of reviews and downloads have typically been on the market for at least a few years.

Follow these guidelines before you download any application. Read through the description, reviews, the developer’s privacy policy, and most importantly, don’t click on suspicious links. Even official app stores will have fake listings from time to time.

If you receive an unexpected SMS, a strange notification, or an unusual request from someone claiming to be a “Binance employee,” proceed with caution.

If you download a fraudulent application or click a suspicious link, your phone, assets, or personal information may get compromised before you even notice.

If you suspect you’ve downloaded a fake application, delete it immediately, restart your phone, and file a report to the relevant app store. While not 100% secure, activating two-factor authentication (2FA) can make a huge difference in protecting your funds, even if someone successfully phishes your login credentials.

Download the Binance App from our official channels

  1. Binance official website
  2. Google Play
  3. Apple App Store

Please note that you are responsible for conducting your own due diligence and following general security measures regarding the legitimacy of any application that appears to be a Binance app before downloading and installing it. Binance is not responsible for any loss that may be incurred from using fake or illegitimate applications.

Disclaimer and Risk Warning: This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial advice, nor is it intended to recommend the purchase of any specific product or service. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions and Binance is not liable for any losses you may incur. Not financial advice. For more information, see our Terms of Use and Risk Warning.

Read more: https://www.binance.com/en/blog/community/a-guide-to-fake-apps-how-to-spot-and-avoid-them-1364775620396510923

Get the latest news here: Cointime channel — https://t.me/cointime_en

Comments

All Comments

Recommended for you

  • ETH Falls Below $2300

    Market data shows that ETH has fallen below $2300, currently priced at $2299.92, with a 24-hour decline of 0.38%. The market is experiencing significant fluctuations, so please ensure proper risk management.

  • Trump: Disappointed if New Fed Chair Does Not Cut Interest Rates

    On April 21, U.S. President Trump stated: If the new Federal Reserve Chair does not cut interest rates, I will be disappointed.

  • Chairman of the Joint Chiefs of Staff Milley States Readiness to Resume Operations

    On April 21, Chairman of the Joint Chiefs of Staff Mark Milley stated that the U.S. is ready to resume operations and can act against Iran at any time. (Axios)

  • Inside the 'fake police raid' that forced a $1M Bitcoin transfer

    A fake police raid enabled a $1 million Bitcoin robbery, exposing the rise of wrench attacks and the shift from digital hacks to physical crypto threats.

  • Bank of Japan to Maintain Interest Rates in April

    On April 21, according to Nikkei News: The Bank of Japan will maintain interest rates unchanged in April.

  • Iranian Military: Ready to Respond Decisively to 'Enemy's Breach of Promises'

    On April 21, local time, Abdollahi, commander of the Khatam al-Anbiya Central Command of the Iranian Armed Forces, stated that Iran is prepared to respond decisively to the 'enemy's breach of promises.' Abdollahi emphasized that the current Iranian military possesses 'authority, readiness, and comprehensive strategic capabilities.' He noted that the Islamic Revolutionary Guard Corps and other defense forces have demonstrated combat capabilities in relevant operations, putting 'Israel and the United States in a difficult and fatigued position,' forcing them to 'seek a ceasefire.' Abdollahi also stressed that the Iranian armed forces maintain a high level of unity with the government and the people under the supreme leader's unified command, and will respond 'decisively, resolutely, and promptly' to any threats and actions. (CCTV News)

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.