Fraud - Criminals Rent Virtual Phones to Bypass Bank Security
Basically, criminals are using fake phones to trick banks into thinking they are real users.
Criminals are now renting virtual phones to bypass bank security measures. This tactic poses significant risks to banking customers. Stay vigilant and protect your accounts from unauthorized access.
What Happened
Researchers at Group-IB have uncovered a new tactic used by criminals to bypass bank security. They are renting virtual Android devices, known as cloud phones, which can mimic real device fingerprints. This allows them to trick banks' fraud detection systems, making it easier to execute account takeovers. Originally designed for testing, these virtual phones have become a tool for cybercriminals looking to exploit banking systems.
The shift from physical phone farms to cloud phones has made this fraud infrastructure more accessible. With costs as low as $0.10 to $0.50 per hour, almost anyone can rent these devices. As banking increasingly relies on mobile apps, the need for robust device identification has grown, but so have the criminals' tactics.
Who's Being Targeted
Banks are the primary targets of this fraud scheme, but ultimately, it's the customers who suffer. The criminals use social engineering to trick users into providing sensitive information, such as one-time passwords (OTPs) or approving transactions. Once they gain access, they can execute unauthorized transactions that appear legitimate to the bank's security systems.
The pre-warming of these virtual devices is a key tactic. By installing banking apps and running small transactions, criminals make the device seem trustworthy. This level of sophistication allows them to bypass security measures that banks have put in place to protect their customers.
Signs of Infection
Customers may not notice anything unusual until it's too late. The signs of infection can include unexpected requests for account verification or unusual transaction alerts. If a user receives a message asking them to verify their bank account through a third-party app, itโs likely a scam.
Additionally, if a bank account suddenly shows unauthorized transactions, it could indicate that a criminal is using a cloud phone to access the account. Being vigilant about account activity is crucial in detecting these types of attacks early.
How to Protect Yourself
To safeguard against these tactics, users should take proactive measures. Here are some recommendations:
- Never complete verification processes under third-party instruction. Banks will not ask for sensitive information through unfamiliar apps.
- Enable device-based security features like biometric authentication and strong security settings on your device.
- Be cautious of job offers that require you to verify bank accounts or move money to โsafeโ accounts.
- Contact your bank immediately if you suspect you've been targeted. Update passwords and enable multi-factor authentication on all accounts.
Additionally, consider turning on banking alerts for logins and transactions. Using a real-time anti-malware solution can also help detect and stop potential threats. Staying informed and cautious is key to protecting yourself in this evolving landscape of banking fraud.
Malwarebytes Labs