Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      In-House vs. Outsource Node.js Development Teams: 9 Key Differences for the C-Suite (2025)

      July 19, 2025

      Why Non-Native Content Designers Improve Global UX

      July 18, 2025

      DevOps won’t scale without platform engineering and here’s why your teams are still stuck

      July 18, 2025

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      I ditched my Bluetooth speakers for this slick turntable – and it’s more practical than I thought

      July 19, 2025

      This split keyboard offers deep customization – if you’re willing to go all in

      July 19, 2025

      I spoke with an AI version of myself, thanks to Hume’s free tool – how to try it

      July 19, 2025

      I took a walk with Meta’s new Oakley smart glasses – they beat my Ray-Bans in every way

      July 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 19, 2025
      Recent

      The details of TC39’s last meeting

      July 19, 2025

      Simple wrapper for Chrome’s built-in local LLM (Gemini Nano)

      July 19, 2025

      Online Examination System using PHP and MySQL

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Top 7 Computer Performance Test Tools Online (Free & Fast)

      July 19, 2025
      Recent

      Top 7 Computer Performance Test Tools Online (Free & Fast)

      July 19, 2025

      10 Best Windows 11 Encryption Software

      July 19, 2025

      Google Chrome Is Testing Dynamic Country Detection for Region-Specific Features

      July 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Apple Stops 1.9M Risky Apps, Terminates 146K Fraud Accounts in 2024

    Apple Stops 1.9M Risky Apps, Terminates 146K Fraud Accounts in 2024

    May 29, 2025

    App Store fraud

    Apple, in its latest App Store fraud analysis, revealed that the company prevented more than $2 billion in potentially fraudulent transactions in 2024 alone. This contributes to a staggering total of $9 billion in fraudulent activities thwarted since 2019.  

    With more than 813 million visitors weekly and active operations in 175 regions, maintaining the platform’s integrity requires Apple to protect its users and upgrade defenses. Here is a quick breakdown of the 2024 Apple App Store fraud analysis. 

    A Layered Defense Against Fraudulent Transactions 

    To address a rising tide of deceptive tactics, Apple employs a multi-pronged strategy that includes both automated systems and human oversight. In 2024, Apple rejected over 1.9 million app submissions for not meeting the platform’s stringent standards, which include checks for reliability, privacy, and potential fraud. Of these, 400,000 apps were denied specifically for privacy violations, while over 320,000 were flagged for spam, copying, or misleading content. 

    App Review remains a cornerstone of Apple’s defense mechanism, with a team that reviews an average of 150,000 app submissions each week. In total, over 7.7 million submissions were assessed in 2024. Apple reports that more than 37,000 apps were removed for fraudulent activity, many of which were linked to broader developer networks attempting to bypass scrutiny.

    One method fraudsters use is hiding deceptive features in apps that only activate after passing initial review. In response, Apple rejected over 43,000 submissions for containing hidden or undocumented features in 2024. 

    Cracking Down on App Store Fraud 

    Fraud isn’t limited to apps. Apple also cracked down on account abuse, a common gateway for malicious activity. Last year, more than 146,000 developer accounts were terminated due to fraud, and another 139,000 developer enrollment attempts were rejected outright. 

    On the consumer side, Apple took decisive action by rejecting over 711 million customer account creation attempts and deactivating nearly 129 million accounts. These accounts often aim to manipulate the App Store’s ratings, reviews, and rankings, distorting the marketplace and undermining legitimate developers. 

    Apple also extended its scrutiny beyond the App Store’s borders. In 2024, the company detected and blocked over 10,000 unauthorized apps on pirate storefronts, preventing nearly 4.6 million attempts to install or launch apps from unapproved sources. 

    Fighting App Store Discovery Fraud 

    Another important front in Apple’s anti-fraud battle is the discovery of fraud apps and developers that manipulate rankings and visibility through artificial means. In 2024, Apple processed more than 1.2 billion ratings and reviews, removing over 143 million fraudulent entries that sought to game the system. The company also removed more than 7,400 apps from App Store charts and nearly 9,500 deceptive apps from search results, leveling the playing field for developers in good standing. 

    A major highlight of the 2024 App Store fraud analysis was Apple’s protection of its payment infrastructure. Using technologies such as Apple Pay and StoreKit, Apple prevented over $2 billion in fraudulent transactions last year. The company also detected and blocked the use of 4.7 million stolen credit cards and banned over 1.6 million accounts from conducting further transactions. 

    Apple emphasizes the security advantages of Apple Pay, which utilizes a unique device-specific number and transaction code for each purchase. This means actual card numbers are neither stored on the device nor shared with developers, further mitigating risks. 

    More than 420,000 apps now utilize StoreKit to power in-app purchases, which Apple says are processed with built-in fraud detection, end-to-end encryption, and user control tools like purchase history, refund support, and subscription management. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
    Next Article Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 19, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-49879 – Themezaa Litho Path Traversal Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Warhammer 40,000: Dawn of War, one of the greatest RTS games ever made, just got the release date announced for its Definitive Edition

    News & Updates

    CVE-2025-35995 – BIG-IP PEM Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Redox OS: Il sistema operativo basato su Rust implementa il supporto a X11 e il porting di GTK3

    Linux

    Highlights

    News & Updates

    DeepMind CEO calls Google’s updated Gemini 2.5 Pro AI “the best coding model” with a taste for aesthetic web development

    May 8, 2025

    Google recently shipped a major update to its Gemini 2.5 AI model with improved coding…

    CVE-2025-52922 – Innoshop Directory Traversal Remote File Inclusion

    June 23, 2025

    CVE-2025-3903 – Drupal UEditor – 百度编辑器 File Inclusion Vulnerability

    April 23, 2025

    Don’t let dormant accounts become a doorway for cybercriminals

    June 3, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.