Device ID reset fraud is a mobile fraud in which a fraudster resets the device ID of a stolen or compromised mobile device to make it appear as a new device. This allows the fraudster to bypass fraud detection systems based on device ID and use the device for fraudulent activities such as creating fake accounts or making unauthorized purchases. Additionally, since the device ID is used to identify a device for ad clicks, app downloads, and in-app purchases, resetting the device ID can also allow a fraudster to make unauthorized clicks, downloads, and purchases.
To reset the device ID, a fraudster typically uses a technique called "rooting" or "jailbreaking," which allows them to gain root access to the device's operating system and then use specialized software or apps to change the device ID. This can be done by changing the IMEI (International Mobile Equipment Identity) number, MAC (Media Access Control) address, or other unique identifiers of the device.
Once the device ID has been reset, the fraudster can use the device to create fake or duplicate accounts or use automated scripts to generate fraudulent ad impressions or clicks. Device ID reset fraud can enable fraudsters to bypass fraud detection systems based on device ID and generate fraudulent ad revenue. Additionally, since the device ID is used to identify a device for app downloads and in-app purchases, resetting the device ID can also allow a fraudster to make unauthorized downloads and purchases.