Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions.
Cloud phones are virtual Android devices that can fully mimic real device fingerprints (model, hardware, IP, timezone, sensor data, behavior). This allows them to undermine banks’ device‑based fraud detection.
Originally, phone farms were made up of physical devices and were set up for t...
The strongest version of this narrative highlights a critical evolution in cybercrime: the weaponization of cloud-based virtual devices to exploit trust in device fingerprinting. Group-IB’s research credibly demonstrates how fraudsters adapt to security measures, turning legitimate technology (cloud phones) into a tool for financial theft. The analysis avoids sensationalism, focusing on verifiable tactics like "pre-warming" devices and the low cost of rental infrastructure. However, the framing ...
