Facing a wave of cloned apps designed to steal user credentials and private keys, the exchange turned to Talox for automated global monitoring and takedowns.
Sophisticated attackers were creating visually identical clones of the exchange's mobile app, injecting malware to steal login credentials and wallet seeds. These apps were spread via Telegram groups and third-party APK stores, threatening user funds and brand reputation.
Visually identical fake apps with credential-stealing malware injected
Spread via Telegram, third-party stores, and social engineering
Manual takedown requests took weeks, leaving users exposed
Manual takedown requests were taking an average of 5 days to process, during which thousands of users could potentially download the malicious apps and lose their crypto assets. The security team was overwhelmed by the scale of the problem.
The exchange activated Talox Leaks for 24/7 monitoring across the open web, dark web, and social channels. Talox's visual AI matched the brand's logo and UI against newly published APKs globally, automatically initiating takedowns upon detection.
Logo and UI recognition across all app stores
Open web, dark web, and social channel coverage
Monitoring distribution channels in real-time
Automated DMCA and abuse reports filed instantly
The detection-to-takedown lifecycle shrank from an average of 5 days to under 24 hours. Over 500 malicious cloned apps were automatically removed from circulation in the first quarter alone, significantly reducing phishing risks for their user base.
95% faster response to threats
Malicious clones taken down in Q1 alone
By reducing the lifespan of malicious apps from days to hours, the exchange dramatically decreased the window of opportunity for attackers to harvest user credentials and wallet seeds.