- published 3/25/26 8:51 AM •
- updated •
- 5 MIN
CSC warns against downloading and using fake applications
As part of the weekly awareness campaign of the "Cyber Pulse" initiative launched by the Cyber Security Council (CSC), the Council warned in its weekly message against fake applications and the risks associated with downloading them onto users’ devices. Emphasizing that such applications may serve as gateways to data and information theft, fraud, or cyber extortion. The "Cyber Pulse" campaign stressed in its weekly awareness message that avoiding the download and use of such applications helps individuals minimize risks, limit fraudsters’ access to user data, and safeguard personal information.
CSC affirmed that fake applications have emerged as one of the most dangerous tools of cyber fraud, threatening both individuals and institutions alike. The Council noted that the danger of these applications extends beyond mere data theft; they also lure victims and subsequently blackmail them after obtaining sensitive information, images, or financial data, exploiting the trust of users who download these applications without sufficient verification.
In its weekly Message, the Council highlighted that fake applications have become more sophisticated than ever. Fraudsters meticulously replicate the interfaces of legitimate applications, using names and logos that closely resemble authentic ones. Estimates indicate that more than 85% of fake applications impersonate well-known apps, making detection a genuine challenge even for experienced users. The threat goes beyond visual imitation, as fraudsters increasingly combine these fake applications with deep fake technologies to deceive users through fabricated videos or audio recordings that convey false credibility.
The awareness campaign further stated that approximately 73% of institutions in 2025 exposed to some form of cyber fraud through fake applications and other malicious digital tools, reflecting the scale of the phenomenon and its direct impact on the digital economy. In a single year alone, more than 200 fake applications identified, collectively downloaded over 40 million times via the Google Play Store, an alarming figure that underscores the speed and breadth with which such applications can reach millions of devices worldwide before detected and removed.
CSC explained that distinguishing between a legitimate and a fake application is possible through a set of measures often overlooked by users. The first element to verify is the developer’s name; authentic applications typically issued by well-known companies or verified developers, whereas fake applications often display unfamiliar developer names or names that closely mimic the original with slight variations. The logo also serves as an important indicator: while it may appear identical at first glance, closer inspection often reveals subtle differences in color, resolution, or design.
The Council further emphasized that reviews and ratings constitute another critical detection tool. Fake applications frequently feature exaggerated ratings or repetitive comments with similar wording, or conversely, numerous complaints regarding malfunctions and unjustified permission requests. Requested permissions themselves represent a serious red flag; it is illogical for a simple application to request access to photos, the camera, location, or contacts without a clear and legitimate reason. The update history also reflects the professionalism of the developer: genuine applications receive regular updates to address vulnerabilities and enhance performance, whereas fake applications typically lack a consistent update record or display a very recent launch date with no prior history.
The Council warned that the gravest risk lies in the fact that some fake applications do not stop at stealing data, but instead use the stolen information to financially extort victims or threaten to publish private content. In this context, the weekly awareness campaign of the Cyber Pulse initiative underscored the importance of adhering to several decisive steps. Foremost among them is refraining from paying any sums of money under any circumstances, as payment does not guarantee that the extortion will encourage FOR further demands. Victims are also advised not to send any additional information, images, or documents, as doing so provides fraudsters with further leverage.
The Cyber Pulse awareness campaign launched by the Cyber Security Council and now in its second consecutive year across social media platforms, forms part of the United Arab Emirates’ ongoing efforts to build a secure cyberspace that protects users from escalating digital risks and keeps pace with rapid technological advancements. This aligns with a comprehensive national vision aimed at strengthening trust in the country’s digital ecosystem, promoting a culture of cyber security, raising digital awareness among families and individuals, and reinforcing cyber security practices to ensure the safety and privacy of citizens and residents in an era of accelerated digital transformation.
Summary
More Updates
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council emphasized the importance of digital identity, noting that it is one of the most valuable assets owned by individuals and organizations. The Council highlighted that nearly 97% of cyberattacks target passwords, while around 40% of social media users worldwide have either been compromised or have unintentionally shared personal data. It further warned that the consequences of a digital identity breach extend beyond data loss to include identity theft, fraud, financial losses, and negative impacts on personal and professional reputation. During the first half of the year, indicators also showed a significant increase of 32% in cyberattacks targeting digital identities, amid the growing reliance on digital services and smart applications. To strengthen protection, users are advised not to share sensitive personal information, to use strong and complex passwords, and to enable multi-factor authentication. These steps constitute the first line of defense against growing threats.
Informing
Corporations, Individuals & Families
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council noted that cyber threats have become increasingly complex and widespread, driven by the growing reliance on the internet in various aspects of daily life. More than 750,000 browsing sessions are recorded daily, reflecting the vast scale of digital activity. Each browsing session represents an opportunity for targeting users through malware or fraudulent webpages, especially given the reliance on the internet for financial transactions, government services, and social communication. The Council affirmed that browser security technologies serve as a technical shield that protects users while browsing. These technologies include encryption, isolation, and preventive policies designed to prevent breaches, data leakage, and unauthorized tracking. Key guidelines to enhance browsing security include verifying links before clicking, regularly updating browsers, and avoiding downloads from untrusted sources.
Informing
Corporations, Individuals & Families
Abu Dhabi – April 2026
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council stressed the importance of regular inspection and cleaning of electronic devices such as mobile phones and personal tablets, noting that these practices can reduce cyber incidents by up to 30%. The Council explained that the accumulation of unnecessary files and data makes it easier for malicious software to infiltrate devices, thereby increasing cyber risks and exposing users to potential data loss or privacy breaches. Key signs that a device may require cleaning include slow performance, unusual messages or recurring errors, full storage capacity, and the presence of unknown or unused applications. Therefore, it is important to adopt a simple digital cleaning routine that can significantly enhance device security. This routine includes using trusted security software, deleting unnecessary files and applications, and regularly updating operating systems and software to address vulnerabilities and enhance performance.
Informing
Corporations, Government, Individuals & Families
Thank You for Staying Informed
Your commitment to staying informed about the latest news in cybersecurity is a significant step toward safeguarding our digital environment.