Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Apple Stops 1.9M Risky Apps, Terminates 146K Fraud Accounts in 2024

    Apple Stops 1.9M Risky Apps, Terminates 146K Fraud Accounts in 2024

    May 29, 2025

    App Store fraud

    Apple, in its latest App Store fraud analysis, revealed that the company prevented more than $2 billion in potentially fraudulent transactions in 2024 alone. This contributes to a staggering total of $9 billion in fraudulent activities thwarted since 2019.  

    With more than 813 million visitors weekly and active operations in 175 regions, maintaining the platform’s integrity requires Apple to protect its users and upgrade defenses. Here is a quick breakdown of the 2024 Apple App Store fraud analysis. 

    A Layered Defense Against Fraudulent Transactions 

    To address a rising tide of deceptive tactics, Apple employs a multi-pronged strategy that includes both automated systems and human oversight. In 2024, Apple rejected over 1.9 million app submissions for not meeting the platform’s stringent standards, which include checks for reliability, privacy, and potential fraud. Of these, 400,000 apps were denied specifically for privacy violations, while over 320,000 were flagged for spam, copying, or misleading content. 

    App Review remains a cornerstone of Apple’s defense mechanism, with a team that reviews an average of 150,000 app submissions each week. In total, over 7.7 million submissions were assessed in 2024. Apple reports that more than 37,000 apps were removed for fraudulent activity, many of which were linked to broader developer networks attempting to bypass scrutiny.

    One method fraudsters use is hiding deceptive features in apps that only activate after passing initial review. In response, Apple rejected over 43,000 submissions for containing hidden or undocumented features in 2024. 

    Cracking Down on App Store Fraud 

    Fraud isn’t limited to apps. Apple also cracked down on account abuse, a common gateway for malicious activity. Last year, more than 146,000 developer accounts were terminated due to fraud, and another 139,000 developer enrollment attempts were rejected outright. 

    On the consumer side, Apple took decisive action by rejecting over 711 million customer account creation attempts and deactivating nearly 129 million accounts. These accounts often aim to manipulate the App Store’s ratings, reviews, and rankings, distorting the marketplace and undermining legitimate developers. 

    Apple also extended its scrutiny beyond the App Store’s borders. In 2024, the company detected and blocked over 10,000 unauthorized apps on pirate storefronts, preventing nearly 4.6 million attempts to install or launch apps from unapproved sources. 

    Fighting App Store Discovery Fraud 

    Another important front in Apple’s anti-fraud battle is the discovery of fraud apps and developers that manipulate rankings and visibility through artificial means. In 2024, Apple processed more than 1.2 billion ratings and reviews, removing over 143 million fraudulent entries that sought to game the system. The company also removed more than 7,400 apps from App Store charts and nearly 9,500 deceptive apps from search results, leveling the playing field for developers in good standing. 

    A major highlight of the 2024 App Store fraud analysis was Apple’s protection of its payment infrastructure. Using technologies such as Apple Pay and StoreKit, Apple prevented over $2 billion in fraudulent transactions last year. The company also detected and blocked the use of 4.7 million stolen credit cards and banned over 1.6 million accounts from conducting further transactions. 

    Apple emphasizes the security advantages of Apple Pay, which utilizes a unique device-specific number and transaction code for each purchase. This means actual card numbers are neither stored on the device nor shared with developers, further mitigating risks. 

    More than 420,000 apps now utilize StoreKit to power in-app purchases, which Apple says are processed with built-in fraud detection, end-to-end encryption, and user control tools like purchase history, refund support, and subscription management. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
    Next Article Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    5 ways to turn AI’s time-saving magic into your productivity superpower

    News & Updates

    Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager

    Development

    CVE-2025-38159 – “RTW88 WiFi Out-of-Bounds Read”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48174 – Avif Integer Overflow Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-49278 – Blogty PHP RFI Vulnerability

    June 9, 2025

    CVE ID : CVE-2025-49278

    Published : June 9, 2025, 4:15 p.m. | 25 minutes ago

    Description : Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in Unfoldwp Blogty allows PHP Local File Inclusion. This issue affects Blogty: from n/a through 1.0.11.

    Severity: 8.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    BrosTrend AX1800 USB WiFi 6 Adapter AX4L Linux Compatible

    July 8, 2025

    CVE-2025-5478 – Sony XAV-AX8500 Bluetooth SDP Protocol Integer Overflow Remote Code Execution Vulnerability

    June 20, 2025

    Top 21 Developer Newsletters to Subscribe To in 2025

    July 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.