menu
close
close

Experienced a potential cyberattack or suspicious activity?

What are you looking for?
close
  • published 3/25/26 8:51 AM
  • updated
  • 5 MIN

CSC warns against downloading and using fake applications

Card Image

As part of the weekly awareness campaign of the "Cyber Pulse" initiative launched by the Cyber Security Council (CSC), the Council warned in its weekly message against fake applications and the risks associated with downloading them onto users’ devices. Emphasizing that such applications may serve as gateways to data and information theft, fraud, or cyber extortion. The "Cyber Pulse" campaign stressed in its weekly awareness message that avoiding the download and use of such applications helps individuals minimize risks, limit fraudsters’ access to user data, and safeguard personal information. 

 

CSC affirmed that fake applications have emerged as one of the most dangerous tools of cyber fraud, threatening both individuals and institutions alike. The Council noted that the danger of these applications extends beyond mere data theft; they also lure victims and subsequently blackmail them after obtaining sensitive information, images, or financial data, exploiting the trust of users who download these applications without sufficient verification. 

 

In its weekly Message, the Council highlighted that fake applications have become more sophisticated than ever. Fraudsters meticulously replicate the interfaces of legitimate applications, using names and logos that closely resemble authentic ones. Estimates indicate that more than 85% of fake applications impersonate well-known apps, making detection a genuine challenge even for experienced users. The threat goes beyond visual imitation, as fraudsters increasingly combine these fake applications with deep fake technologies to deceive users through fabricated videos or audio recordings that convey false credibility. 

 

The awareness campaign further stated that approximately 73% of institutions in 2025 exposed to some form of cyber fraud through fake applications and other malicious digital tools, reflecting the scale of the phenomenon and its direct impact on the digital economy. In a single year alone, more than 200 fake applications identified, collectively downloaded over 40 million times via the Google Play Store, an alarming figure that underscores the speed and breadth with which such applications can reach millions of devices worldwide before detected and removed. 

 

CSC explained that distinguishing between a legitimate and a fake application is possible through a set of measures often overlooked by users. The first element to verify is the developer’s name; authentic applications typically issued by well-known companies or verified developers, whereas fake applications often display unfamiliar developer names or names that closely mimic the original with slight variations. The logo also serves as an important indicator: while it may appear identical at first glance, closer inspection often reveals subtle differences in color, resolution, or design. 

 

The Council further emphasized that reviews and ratings constitute another critical detection tool. Fake applications frequently feature exaggerated ratings or repetitive comments with similar wording, or conversely, numerous complaints regarding malfunctions and unjustified permission requests. Requested permissions themselves represent a serious red flag; it is illogical for a simple application to request access to photos, the camera, location, or contacts without a clear and legitimate reason. The update history also reflects the professionalism of the developer: genuine applications receive regular updates to address vulnerabilities and enhance performance, whereas fake applications typically lack a consistent update record or display a very recent launch date with no prior history. 

 

The Council warned that the gravest risk lies in the fact that some fake applications do not stop at stealing data, but instead use the stolen information to financially extort victims or threaten to publish private content. In this context, the weekly awareness campaign of the Cyber Pulse initiative underscored the importance of adhering to several decisive steps. Foremost among them is refraining from paying any sums of money under any circumstances, as payment does not guarantee that the extortion will encourage FOR further demands. Victims are also advised not to send any additional information, images, or documents, as doing so provides fraudsters with further leverage. 

 

The Cyber Pulse awareness campaign launched by the Cyber Security Council and now in its second consecutive year across social media platforms, forms part of the United Arab Emirates’ ongoing efforts to build a secure cyberspace that protects users from escalating digital risks and keeps pace with rapid technological advancements. This aligns with a comprehensive national vision aimed at strengthening trust in the country’s digital ecosystem, promoting a culture of cyber security, raising digital awareness among families and individuals, and reinforcing cyber security practices to ensure the safety and privacy of citizens and residents in an era of accelerated digital transformation. 

Summary
As part of the weekly awareness campaign of the “Cyber Pulse” initiative, launched by the Cyber Security Council, the Council warned about the risks posed by fake applications, which may serve as gateways for data and personal information theft, as well as fraud and cyber extortion. The campaign emphasized that avoiding the download of such applications and verifying sources can help users minimize risks and limit fraudsters’ access to user data. The Council explained that the risks posed by fake applications are not limited to data theft. They may also be used to lure victims and subsequently blackmail them after obtaining sensitive information, images, or financial data, exploiting the trust of users who download these applications without sufficient verification. Statistics indicate that, in 2025, approximately 73% of institutions were exposed to forms of cyber fraud through fake applications and other malicious digital tools, while more than 200 fake applications were identified and downloaded over 40 million times via the Google Play Store. The Cyber Security Council also confirmed that distinguishing between a legitimate and a fake application is possible through a set of measures often overlooked by users.

Stay Connected

Follow our channels
Follow our social media channels to stay up to date.
Social Icon Social Icon Social Icon Social Icon Social Icon

TAKE ACTION

Spread Awareness

Share this news to spread valuable information and help others stay updated.

More Updates

News

Abu Dhabi – April 2026

CSC calls for protecting and safeguarding digital identity

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council emphasized the importance of digital identity, noting that it is one of the most valuable assets owned by individuals and organizations. The Council highlighted that nearly 97% of cyberattacks target passwords, while around 40% of social media users worldwide have either been compromised or have unintentionally shared personal data. It further warned that the consequences of a digital identity breach extend beyond data loss to include identity theft, fraud, financial losses, and negative impacts on personal and professional reputation. During the first half of the year, indicators also showed a significant increase of 32% in cyberattacks targeting digital identities, amid the growing reliance on digital services and smart applications. To strengthen protection, users are advised not to share sensitive personal information, to use strong and complex passwords, and to enable multi-factor authentication. These steps constitute the first line of defense against growing threats.

Informing

Corporations, Individuals & Families

News

Abu Dhabi – April 2026

CSC Stresses the Need to Ensure Safe Internet Browsing

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council noted that cyber threats have become increasingly complex and widespread, driven by the growing reliance on the internet in various aspects of daily life. More than 750,000 browsing sessions are recorded daily, reflecting the vast scale of digital activity. Each browsing session represents an opportunity for targeting users through malware or fraudulent webpages, especially given the reliance on the internet for financial transactions, government services, and social communication. The Council affirmed that browser security technologies serve as a technical shield that protects users while browsing. These technologies include encryption, isolation, and preventive policies designed to prevent breaches, data leakage, and unauthorized tracking. Key guidelines to enhance browsing security include verifying links before clicking, regularly updating browsers, and avoiding downloads from untrusted sources.

Informing

Corporations, Individuals & Families

News

Abu Dhabi – April 2026

CSC highlight the importance of inspection and cleaning of electronic devices

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council stressed the importance of regular inspection and cleaning of electronic devices such as mobile phones and personal tablets, noting that these practices can reduce cyber incidents by up to 30%. The Council explained that the accumulation of unnecessary files and data makes it easier for malicious software to infiltrate devices, thereby increasing cyber risks and exposing users to potential data loss or privacy breaches. Key signs that a device may require cleaning include slow performance, unusual messages or recurring errors, full storage capacity, and the presence of unknown or unused applications. Therefore, it is important to adopt a simple digital cleaning routine that can significantly enhance device security. This routine includes using trusted security software, deleting unnecessary files and applications, and regularly updating operating systems and software to address vulnerabilities and enhance performance.

Informing

Corporations, Government, Individuals & Families