Tom Tovar

Thinking Differently - How to Make Money from Cyber Attacks & Cheats

What if you could turn mobile game cheaters into paying customers? Learn how to monetize attacks instead of just blocking them.

Thinking Differently - How to Make Money from Cyber Attacks & Cheats
#1about 3 minutes

Rethinking cyber attacks as a revenue opportunity

Instead of blocking all attacks, consider the user's intent and transform security events into monetization moments.

#2about 4 minutes

Understanding the scale and speed of mobile app attacks

Mobile apps are attacked within milliseconds of being published, with a significant percentage of the user base under attack at any given time.

#3about 2 minutes

Monetizing users on gray market gaming platforms

Instead of blocking users on emulators like BlueStacks, partner with the platform to charge a bounty for each player you allow.

#4about 3 minutes

Turning memory editing cheats into paid upgrades

When a player uses a tool like Game Guardian to edit memory for in-game currency, offer them the option to purchase those points legitimately.

#5about 2 minutes

Converting advanced cheaters into subscribers

For users employing advanced tools like Lucky Patcher, offer a subscription model that legitimizes their enhanced gameplay as a premium feature.

#6about 3 minutes

Creating a pro league for automated bot users

Channel users who run automated bots into a separate 'pro league' where they can compete against other bots, creating a new competitive tier.

#7about 2 minutes

Knowing which attacks should not be monetized

Distinguish between users trying to enhance their experience and malicious actors committing fraud or identity theft, which must always be blocked.

#8about 3 minutes

Implementing a framework for attack monetization

A successful monetization strategy requires a framework to detect attacks, provide telemetry data, and give developers control over the business logic outcome.

#9about 3 minutes

Q&A on common attacks and detection methods

The most common mobile gaming attack is memory editing, and reliable defense involves detecting the patching methods used by attackers on both the app and the defense itself.

Related jobs
Jobs that call for the skills explored in this talk.

d

Saby Company
Delebio, Italy

Junior

test

Milly
Vienna, Austria

Intermediate

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
LM
Luis Minvielle
9 Ways to Make Money Hacking
Cybercrime is still a currency black hole. Industry insiders report, year after year, how companies lose trillions of dollars each year to hacking, scams, and data breaches. This is a huge problem, which also means that if you can do something about ...
9 Ways to Make Money Hacking
CH
Chris Heilmann
Dev Digest 120 - Apple and peers
Hello fellow developer, yes, yes, yes, Apple announced a ton of things last week, so much so that you can't escape the announcements, which is why we won't cover them here. Instead, here are some interesting security and performance news.News and Art...
Dev Digest 120 - Apple and peers
CH
Chris Heilmann
Dev Digest 116 - WWWAI?
This time, learn how to un-AI Google's search results, what's new on the web, avoid a new security hole and go back to BASICS with us. News and ArticlesWhat a week. Google, Microsoft, OpenAI and many others had their big flagship events announcing th...
Dev Digest 116 - WWWAI?

From learning to earning

Jobs that call for the skills explored in this talk.