Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise

March 25, 2026

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

March 25, 2026

Cloud Phones Linked to Rising Financial Fraud Threat

March 25, 2026
Facebook X (Twitter) Instagram
Wednesday, March 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Cloud Phones Linked to Rising Financial Fraud Threat
News

Cloud Phones Linked to Rising Financial Fraud Threat

Team-CWDBy Team-CWDMarch 25, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cloud phone technology and financial fraud have become a growing concern for banks and cybersecurity teams, according to new research examining how remote mobile devices hosted in data centres are being used in fraud operations.

A new Group-IB report, published on March 25, outlined how a tool once associated with social media automation has developed into infrastructure supporting financial crime.

Cloud phones are remote-access Android devices that run real mobile operating systems and hardware components but are accessed via the internet.

Because they behave like legitimate smartphones, fraud detection systems often cannot distinguish them from real user devices. This makes them significantly more difficult to detect than traditional emulators or virtual devices previously used in fraud schemes.

The research traces the development of this technology from early social media engagement automation, where multiple accounts were controlled from a single device, through emulator use and physical phone farms, to cloud-based phone services that can be rented cheaply online. These services allow users to operate multiple mobile devices remotely without owning any hardware.

Fraud investigators found that cloud phones are now being used to create and maintain so-called dropper accounts, which are bank accounts used to receive and transfer stolen funds. In the UK, losses linked to Authorized Push Payment fraud reached £485.2m ($649m) in 2022, Group-IB said, with dropper accounts identified as a major contributor.

Read more on phone fraud: Quarter of Brits Report Deepfake Phone Scams

Detection Challenges and Industry Response

The report found that several cloud phone platforms rent virtual devices for very low prices, making fraud infrastructure accessible to individuals with minimal resources. 

In some cases, pre-verified bank accounts linked to cloud phone devices are sold on darknet markets, allowing buyers to access both the account and the same virtual device used during verification.

This means banks may see the login as coming from a familiar device, even though control has changed hands. As a result, fraud detection systems may not trigger additional security checks.

Group-IB said traditional device fingerprinting methods are less effective against cloud phones because each instance has realistic hardware identifiers, sensor data and mobile network characteristics.

Instead, the company recommended multi-layered fraud detection that combines device fingerprinting with network intelligence and behavioral modeling, uses graph-based risk analysis to spot related accounts and monitors new accounts from environments with low app diversity, high financial app density or anonymization tools.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
Next Article LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
Team-CWD
  • Website

Related Posts

News

TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise

March 25, 2026
News

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

March 25, 2026
News

AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds

March 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.