Fraud applications have been a menace to many users who have lost money unknowingly. They are fake applications that are mirrors of legitimate applications available on the market. Fraudsters and scammers create applications to induce people to use them. These applications could be similar to popular applications to mislead users who download them on their phones or laptops. It can be a jumble of words that are more or less similar to frequently used applications. However, these applications have one thing in common; they are disguised as genuine applications and are well constructed.
It is public knowledge that many of these fradulent apps have also been promoted and advertised on Google networks, Facebook, Instagram, TikTok, etc. As per published information, more than 5 lakh Indians were cheated by using Chinese applications amounting to approximately ₹150 crores. Many investment applications were used to swindle small investors.
There are too many cash applications that have witnessed a high percentage of fraud. Cash applications have been chosen carefully as this directly causes financial damage. Such applications are; Ultima Keyboard space 3D pro, GT Sports Racing Online, Fitness Ultimate 2o21, Wi-Fi passcode unlock, video mixer editor pro, RT news, UC Browser, Clean It Reface Ultra, live photo animator, ultra-camera HD, water drinker reminder, magic mix, etcetera. Researchers have identified more than 151 applications that, once installed on phones, can carry out fraudulent activities.
India has emerged as one of the fastest internet mobile growing market and digital adoption has been on a lightening speed because of affordable internet connectivity, extensive smartphone penetration and growing hosuehold income. With over billion mobile subscribers, and ever growing India is the top country when it coms of app installations. The push for digitization by stakeholders has incensed the usage of networks and applications. The applications being used in India, which are mobile applications, are 3.48 million applications. The Google Play and Apple App Stores have the highest number of registered applications. These applications are in many areas like credit, investment, cryptocurrency, health, aggregators, agricultural, data monitoring, gaming, stock markets, etc. The risk for users is certainly high as the usage of mobile applications is high, especially in open architecture.
These applications can access phone locations, carry out phishing activities, use phone data, misuse your payment gateway, and cause financial loss. Data can be accessed and used for various illegal purposes. Such applications can have both financial and non-financial implications. Online users have to be very vigilant to ensure that they do not become victims of these fraudsters.
The government of India has taken measures to eradicate cyber-crime. Local police have cosnistently arrested fraudsters and also investigated promoters of such applications. The government of India banned Chinese applications to protect investors. A comprehensive list of fake applications was circulated to spread awareness.
Application users have to be prudent before they download such applications. Users should not bite the bait and fall prey to these fraudsters. Researching the applications by the user is a must before using and downloading applications. It is also important to see the reviews before using them. It is also important to look for details like the developer of the application and the non-symmetrical placement of logos. Users must choose applications that have been developed by branded and well-established companies. These applications are developed for short-term use and thus do not have the same quality as genuine applications.
Password protection is a very basic step that users must follow. Passwords must be changed frequently and must not be shared. Preventing identity theft is a very important aspect that can be achieved by protecting information. Two-factor authentication would certainly reduce the risk to users. Tokenisation of information is a way to secure data, especially sensitive data.
Details are stolen by fraudsters and fake accounts are opened, which are then misused. Users need to check the URL before clicking. There are instances of pagejacking where clicking on the link may redirect the user to a website. The user may feed the data which can be misused. Users can protect it by feeding data to an OTP-generating and secured website.
Users must also avoid downloading files from unknown sites. These applications can contain malware or spyware that can access data from phones or PCs. This malware can transmit data to other locations; calls, messages, and advertisements soliciting using certain applications, which can be a phishing attempt. This is a mechanism to get data and information, and sharing bank details in any form can be misused by fraudsters. It is also important to know that mobile applications are less secure than websites. Mobile phones have far fewer security tools than websites. Checking internet and phone data bills is a method to cross-check and monitor unauthorized usage. Storing passwords, authentication, and credit and debit card details on phones and tablets is a security threat. Using a secured network is a way to minimize users’ risk, as open networks are vulnerable. Regularly verifying bank balance statements is a good mechanism to ensure your balances are intact. As the threat increases, a large number of tools are available for fraud detection. Artificial intelligence and machine learning technology are available for fraud detection. Tools like Seon, Emailage, etcetera are tools to prevent fraud. There are a lot of fraud detection softwares that is available. Google Play also has an inbuilt mechanism to minimize fraud.
Moving forward, India’s push towards cashless payment has made the industry size $204 billion. Mobile phones are an extremely popular medium for making payments, wherein $290 billion was transacted. Mobile payments grew faster than credit and debit cards. Mobile payment recharges are an indication of the extent to which mobile phones are being used. The UTR system in India has been successful and, unlike in China, where WeChat has caused deposit leaks from banks. The Indian IT infrastructure has stood the test of time. Secured phones and networks will play a vital role in minimizing the loss of accounts through fraud. Many tools can protect and prevent fraud.
But the user will have to follow protocols like password protection, strong authentication, selecting secured networks, and basic file diligence before using applications.Finally, digital literacy and the human element will play a major role in the prevention of fraud, as one has to stick to the basics and be vigilent.
The author is a practising chartered accountant and an independent director on many large public companies whose views and ideas have been instrumental in framing policy
Tags assigned to this article: