Detect and identify counterfeit Android applications.
What a counterfeit application is?
It is an application that, most of the time, acts exactly like the official application: it offers the same services, the same functionalities; it is visually identical; but it has been modified to incorporate malicious code.
This malicious code can, for example: cause data leaks (including sensitive data such as login credentials), abuse the permissions granted to your application for illegitimate use.
The main levers sought by attackers to choose your application as an attack vector are most of the time: your brand image, your notoriety, the trust your customers offer you.
Receive real-time notification e-mails when a new counterfeit version of your applications is detected.
Receive up-to-date anti-virus alerts when counterfeit versions of your application is detected.
Know where counterfeit versions of your application are distributed and who is behind the scam campaign.
Get insights into the behavior of the counterfeit versions to know the risks your business and users face.
Provide a public report to your users and tell them which trusted channels to use to download your application.
API & Web hook
Integrate ScatterScam into your existing security and monitoring platform and enrich your threat list.
How does ScatterScam work?
ScatterScam relies on several bots browsing the Internet daily to detect new published applications.
The signature engine integrated into ScatterScam enables real-time counterfeit detection, tracking and identification of legitimate counterfeit applications.
When ScatterScam detects a counterfeit, it warns you immediately and allows you to take note of the details collected on this counterfeit.
Our commitment to open source projects
Defensive Lab Agency uses a lot of open source softwares and services.
As we never thank these projects enough for all adventures they allow, we have chosen to offer ScatterScam for free to open source projects.