Darwinium Enhances Mobile SDKs to Combat In-Session Fraud and Account Farming
Severity: Medium (Score: 51.9)
Sources: Scworld, Feeds2.Feedburner
Published: · Updated:
Keywords: darwinium, updates, mobile, sdks, remote, access, detect
Severity indicators: ot
Summary
Darwinium UK Ltd. has released updates to its Android and iOS mobile SDKs, enhancing detection capabilities for in-session fraud and account farming. The updates specifically target remote access scams and screen-sharing manipulation, which are increasingly used in sophisticated fraud schemes. Unlike traditional fraud detection methods that only validate trust at login or payment, Darwinium's SDKs provide continuous monitoring throughout user sessions. The new features can identify malicious activities during live calls on platforms like Google Meet and Microsoft Teams. Additionally, the SDKs detect various account farming techniques, including app cloning and GPS spoofing. Banks in Southeast Asia are already leveraging these updates, linking over 10,000 mule accounts to their devices. The enhancements integrate with Darwinium's edge-based decisioning platform, offering real-time integrity data to improve fraud prevention efforts. Key Points: • Darwinium's SDK updates enable continuous in-session fraud detection for mobile applications. • The updates specifically target remote access scams and account farming techniques. • Over 10,000 mule accounts have been linked to devices using these new capabilities in Southeast Asia.
Detailed Analysis
**Impact** Banks, payment providers, and digital businesses, particularly in Southeast Asia, are affected by sophisticated in-session fraud and account farming. One customer has linked over 10,000 mule accounts to their devices, indicating large-scale operational impact on financial institutions combating mule networks. The fraud targets post-authentication sessions, increasing risk to transaction integrity and customer accounts beyond initial login. **Technical Details** The attack vectors include remote access scams, screen-sharing manipulation, device tricks such as app cloning, repackaged apps, multiple user profiles on a single device, GPS spoofing, and emulator use on iOS/macOS. The SDK updates detect live calls on collaboration tools like Google Meet and Microsoft Teams to differentiate malicious remote access from legitimate screen sharing. No specific malware, CVEs, or IOCs are mentioned in the articles. **Recommended Response** Defenders should integrate the updated Darwinium Android and iOS SDKs into their mobile applications to enable continuous in-session fraud detection. Monitoring for signs of remote access scams, screen-sharing abuse, and device manipulation techniques should be prioritized. Organizations should also leverage real-time integrity data from edge-based decisioning platforms to enhance risk engine accuracy. No additional patching or IOC-based blocking details are provided.
Source articles (2)
- Darwinium updates mobile SDKs to detect in-session fraud and account farming — Scworld · 2026-05-20
Silicon Angle reports that Darwinium UK Ltd. has released updates to its Android and iOS mobile software development kits, introducing continuous in-session detection capabilities for remote access sc… - Darwinium updates mobile SDKs to detect remote access scam activity — Feeds2.Feedburner · 2026-05-20
Darwinium has announced updates to its Android and iOS mobile SDKs. It enables banks, payment providers, and digital businesses to tackle the proliferation of remote access scams, including those that…
Timeline
- 2026-05-20 — Darwinium announces SDK updates: Darwinium UK Ltd. released updates to its mobile SDKs to enhance detection of in-session fraud and account farming activities.
- 2026-05-20 — Banks utilize new SDK features: Banks in Southeast Asia have begun using the updated SDKs, successfully linking over 10,000 mule accounts to their devices.
Related entities
- Android (Platform)
- Google Meet (Platform)
- IOS (Platform)
- MacOS (Platform)
- Microsoft Teams (Tool)