How to spot a fake app

From 2020 through 2023, Apple stopped a combined total of more than $7 billion in potentially fraudulent transactions linked to fake apps in its App Store.1 And in 2023, Google banned 2.28 million apps from its Play Store, up from 1.43 million in 2022.2

The content of this article is provided for informational purposes only. You should always obtain your own independent, tax, financial, and legal advice before making any material decision.

Deceptive apps, such as fake bank transfer apps, are deliberately created to mimic the look and function of legitimate apps, tricking users into downloading them. Once installed, they can access personal and financial data, make unauthorized transactions, or even hijack devices.

Spotting fake apps early and taking steps to safeguard personal information is crucial for protecting against security breaches and financial loss. This article will explain what fake apps are, how they work, and how to protect against them.

Understanding fake apps

Common tactics used by fake apps include mimicking the logos and branding of trusted companies, offering fake discounts or services, and requesting unnecessary permissions during installation. For example, a fake cash app may appear to process transactions but instead captures banking information for malicious purposes.

To avoid these risks, it’s essential to check apps thoroughly before downloading them. Common steps would be to check how long the app has been published for, whether it has the correct logo and branding, and what reviews say about it.

Different types of fake apps

By understanding the traits and types of fake apps, users can take steps to avoid falling victim to them and protect personal data. Here's what to look for to help determine whether an app is real or fake.

Repackaged apps

Repackaged apps, or clone apps, are legitimate apps that have been cloned and modified with malicious code. Cybercriminals take popular apps, alter their source code to insert harmful elements such as spyware or adware, and then redistribute them. These apps may appear to function as intended, while stealing personal data or tracking user activity in the background.

Common signs of a clone app include unexpected permissions requests, poor or inconsistent reviews, or the presence of ads where there were none in the original version.

Trojan apps

A trojan app is designed to appear legitimate but hides malicious activities beneath the surface. These apps often masquerade as trusted software — like a banking app or a popular game — but secretly perform harmful actions such as stealing data, hijacking your device, or installing further malware.

For instance, a fake bank app may look identical to the real one, but behind the scenes, it’s capturing your login details. To avoid trojan apps like these, only download apps from trusted sources and carefully read reviews before installation.

Counterfeit apps

Counterfeit apps impersonate legitimate applications to confuse users into downloading them. These apps are designed to steal login credentials, credit card information, or other sensitive data, with the goal of causing the user to make a fake cash app payment.

Fleeceware

Fleeceware apps exploit users financially by charging excessive subscription fees for services that may not be fully explained upfront. These apps often offer free trials or limited features and charge exorbitant fees once the trial ends or users unknowingly subscribe.

Scareware

Scareware apps deceive users by making them believe their device is infected with a virus or experiencing some critical issue that requires immediate attention. These apps typically prompt users to pay for a service to "fix" the problem, even though no real threat exists.

Users should be wary of any app that issues urgent warnings or demands payment to resolve fake security issues. Legitimate security software does not rely on scare tactics to convince users to act.

Spyware

What is spyware and how is it different from the other types of fake apps? Spyware is a commonly used term referring to malicious apps that secretly monitors user activity and steals personal information without the user’s knowledge. These apps can collect sensitive data, such as login credentials, financial details, and browsing habits, leading to serious privacy violations.

Fake cash apps

Fake cash apps pose as legitimate cash transfer services designed to steal financial information. These apps may claim to offer features like instant money transfers or financial management. But, instead, they aim to capture users’ banking details and drain funds from their accounts.

Spotting fake apps in the Apple App Store and Google Play Store

These range beyond the types listed above. For example, virtual private networks (VPNs) can also be fake and may promise secure browsing but instead collect sensitive information or fail to provide proper encryption.

Here are a few common tips on how to avoid online scams, such as fake apps.

Analysing the app title

Always double-check an app's title to ensure it matches the official name. Fake apps often have slight variations in spelling, formatting errors, or unusual characters in their titles. These subtle changes are designed to make the app appear legitimate at first glance while bypassing strict app store regulations.

Inspecting the app icon

The app icon is another visual cue that can help identify a fake app. Often, fraudulent apps will use icons that closely resemble legitimate ones but with slight differences in colour, design, or proportions. Before downloading, compare the app icon with the official one listed on the developer’s website.

Reviewing the developer’s name

Checking the developer’s name is critical to verifying the authenticity of an app. Fake apps frequently use names very similar to the legitimate developer but with minor alterations. Before downloading, ensure that the developer’s name matches the official developer of the app. If the name seems off or unfamiliar, it’s a red flag.

This can be subtle. For example, real Google apps will be published by Google LLC, but fake ones could list their developer as Google Inc. or Google Labs.

Checking download counts

For popular apps, unusually low download counts can show them to be a type of scam. Legitimate, well-known apps tend to have high download numbers and are frequently updated. If an app claiming to be widely used has very few downloads or was recently released, it could be fraudulent.

Reading consumer reviews

Fake apps often receive negative reviews from users who realize they have been scammed or find the app does not perform as expected. Always take the time to read through both positive and negative app store reviews, paying close attention to any patterns of complaints regarding functionality or suspicious activity.

Examining app permissions

One of the most telling signs of a fake app is the permissions it requests. Always review the permissions before downloading an app. If the app asks for access to data or functions that seem unrelated to its purpose — such as a game requesting access to your contacts — it’s likely a scam.

Common targets for fake apps

Certain categories of apps are more frequently targeted by fraudsters. Popular games, financial services, and utility apps (such as VPNs or battery savers) are often mimicked to trick users into downloading fake versions. These apps may be designed to steal login credentials, distribute malware, or display excessive ads for financial gain.

Protecting yourself from fake app scams

To protect yourself from fake app scams, it’s essential to practice caution. Always keep your device’s software up to date, use reputable antivirus and security apps, and be aware of the latest trends in fake app scams.

Educating yourself on the warning signs of fake apps, such as unusual permissions requests or poor-quality icons, can help you avoid falling victim to malicious applications.

Related content

If you accept cookies, we'll use them to improve and customise your experience and enable our partners to show you personalised PayPal ads when you visit other sites. Manage cookies and learn more