Skip to main content

Competitive Intelligence โ€” Weekly Sync

๐Ÿ“… Week 3 โ€” April 7, 2026 ยท โฑ 30 minutes ยท ๐Ÿ‘ฅ Weekly cadence


1 ยท Competitive and Client Testing (Julia) โ€” Key Findingsโ€‹

XPoint โ€” RSI DE โ€” Key findings so farโ€‹

  • โœ— Critical security gap โ€” FaceTime RDP not detected โ€” MI user wagered on DE iOS
    Casino + sportsbook both allowed remote wagers. Confirmed cross-region with AZ โ€” structural failure.
  • โš  Border performance โ€” near-border pass/fail inconsistent; erroneous failures even moving away from the boundary. Active session SUSPENDED on DE-MD crossing before any spoofing attempt. Static/mobile toggling friction near MD + DE borders vs GeoComply seamless PA.
  • โš  macOS install + UX โ€” requests access to documents folder (known issue). AnyDesk installed (not running) silently blocks betting โ€” false positive.
  • โš  Mac CPU โ€” 1-minute interval spikes from 0.5% โ†’ 16% during poker gameplay.

Additional research โ€” Leaked keys casesโ€‹

  • Anatsa (TeaBot) banking trojan via Google Play, large-scale campaign (77 apps) โ€” runs on real, certified devices in legitimate sessions; payload delivered later. Mass credential theft + financial fraud across regions.
  • GoldFactory campaign (repackaged banking apps) โ€” attackers modified legitimate banking apps, injected malicious code, redistributed them. Integrity checks can be bypassed/removed in repackaged apps.
  • SharkBot banking malware (NCC Group + Cleafy) โ€” Accessibility abuse for credential theft + unauthorized transactions from victims' devices.
  • All integrity checks passed because fraud was performed on real, Play-certified devices within legitimate app sessions.
  • Similar story with Xenomorph banking trojan via Google Play apps.

2 ยท Competitive Research (Valeria) โ€” Key Findingsโ€‹


3 ยท End-user Feedback (Valeria) โ€” Key Findingsโ€‹

๐Ÿ“Š Full dataset: Social Media Competitive Signals ยท Reddit + X/Twitter public posts. Monitoring initiated March 2026.


4 ยท What's Next โ€” Plan for Next Weekโ€‹

Field Testingโ€‹

  • Jailbroken root-hidden iOS โ€” to test on FD WV, Saracen AR, and any client integrated with GeoComply
  • Resigned Saracen AR iOS app โ€” to retest on a new app version (the Engineering team will prepare it this week)
  • Fanatics / OpenBet Locator โ€” validate the integration
  • Radar / Saracen AR, XPoint, Radar / Bet365 โ€” run the Replay Attack testing

Betting Heroโ€‹

  • Radar / Saracen AR (web desktop) โ€” perform full validation of the competitor's app

Integrations teamโ€‹

  • Mkodo research to be posted later this week