Darwinium pushes mobile fraud detection beyond the login moment
Artificial intelligence fraud prevention platform company Darwinium UK Ltd. today released updates to its Android and iOS mobile software development kits, adding continuous in-session detection of remote access scams, screen-sharing manipulation and the device tricks behind large-scale account farming.
The company is pitching the refreshed SDKs as being suited for banks, payment providers and digital businesses contending with scams that unfold after a customer has already authenticated and with mule networks that run dozens or hundreds of accounts from the same handset.
Most fraud platforms validate trust at a single moment, typically at login or payment, through device binding, an authentication step, or a challenge. Darwinium argues that approach no longer fits a threat model in which a legitimately authenticated customer can be coached or coerced into moving money minutes later, often while a remote attacker watches the screen.
The updated SDKs flag live calls running in the background on collaboration tools such as Google Meet, Microsoft Teams and Slack huddles, environments increasingly used to social-engineer victims in real time. They also separate screen-sharing signals by context, distinguishing a benign Google Cast to a television from a TeamViewer session that hands control to an attacker.









