A malware takes control of a device to make fraudulent payments.
The user is tricked into clicking on a hidden payment button, that is disguised as a different button to the eyes of the user.
The theft of the network/SIM identity of users to make a payment on their behalf.
Malicious code is injected through a browser flaw to make an unauthorized automatic payment, that is billed to the user.
A mobile application that secretly contains malware, programmed to go through all the steps of the flow in place of the final user to make payments without asking for the user’s consent.
Short circuits process flow to make payments without clicks.
Transmissions are intercepted and repeated maliciously to make payments.