• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Group-IB report reveals “Invisible Threat” of Cloud Phones as a key tool in financial fraud

by CXO Staff
April 21, 2026
in Future, Middle East, News, Region

Group-IB has released a new report exposing a sophisticated evolution in digital fraud: the rise of Cloud Phones

Group-IB report reveals “Invisible Threat” of Cloud Phones as a key tool in financial fraud

Group-IB has released a new report exposing a sophisticated evolution in digital fraud: the rise of Cloud Phones. The report traces the evolution of these remote-access Android devices from simple social media bots to a primary tool for creating untraceable “dropper” accounts for scams. These are false accounts created by fraudsters based on stolen credentials, specifically targeted to receive and transfer stolen funds. Once used primarily for harmless social media “likes,” this technology has now been weaponised into an industrial-scale financial threat that bypasses traditional bank security systems.

The “Invisible” upgrade to modern fraud

For years, banks have successfully blocked “emulators” – software that tries to mimic a phone on a computer. However, criminals have pivoted to Cloud Phones. These are physical mobile phone motherboards stored in data centres and rented out for as little as $0.10 per hour.

Because these devices use genuine hardware, real serial numbers, and legitimate Android software, they appear “invisible”, bypassing traditional fraud detection. To a bank’s security system, a hacker in a different country using a cloud phone looks exactly like a legitimate customer using a standard smartphone.

The research highlights several key discoveries:

  • Industrial scale: Cloud phone farms, vast networks of physical mobile devices housed in data centres, are facilitating the mass creation of dropper accounts, which are the critical final link in many Authorised Push Payment (APP) scams.
  • Invisibility: By preserving consistent device telemetry, these accounts do not trigger the device-change detection mechanisms that banks rely on to flag account takeovers.
  • Accessibility: It’s no longer just for experts. Platforms like Redfinger, GeeLark, and LDCloud have democratised fraud, making sophisticated infrastructure available with minimal investment.

A new business model for crime

Fraudsters are now selling these cloud phones pre-loaded with fully verified banking and virtual wallet accounts on darknet markets for as little as $50, creating a turnkey solution for money laundering.

A buyer gets access to a pre-verified bank account that is already logged into a specific Cloud Phone. Because the account and the phone are sold together, the bank never sees a “new device” login.

This highlights a dangerous shift in the “money mule” economy. APP fraud continues to lead industry losses. According to the UK Finance Annual Fraud Report 2023, APP fraud losses reached £485.2 million in 2023, with the dropper account fraud identified as the single most contributing incident of all. The problem continues to grow and spread in other regions.

The new rules of detection

For financial institutions, fraud detection must move beyond static device authenticity checks to multi-layered intelligence. These include:

  • Device-environment correlation: Identifying anomalies such as a device’s battery level always being at 100% or showing no motion during use.
  • Behavioural & App analysis: Flagging devices with an unusually high number of financial apps, the presence of anonymisation tools like VPNs, or a suspicious lack of standard, pre-installed applications.
  • Graph-based analytics: Moving beyond single-device evaluation to identify clusters of accounts linked by shared infrastructure patterns.

Financial institutions are urged to adopt multi-layer intelligence platforms that combine device fingerprinting with network intelligence and behavioural modeling. Group-IB’s Fraud Protection platform has already begun deploying new detection rules to identify these remote environments, resulting in a drastic decrease in fraudulent logins for early adopters.

Staying safe: Recommendations for end-users

  • Never complete account verification processes under third-party instruction. Keep in mind that banks and government institutions will not ask customers to authenticate accounts through unfamiliar apps or remote environments.
  • Enable device-based security features. Use official mobile banking apps, biometric authentication, and strong device-level security settings.
  • Be cautious of “easy income” schemes involving bank accounts, such as fake job offers requiring you to “verify” bank accounts, government officials requesting account verification, or bank representatives asking you to move money to “safe” accounts.
  • If you suspect that you have been targeted, contact your bank immediately. Update passwords and enable multi-factor authentication on all accounts.
Tags: Cloud PhonesGroup-IBInvisible Threat
ShareTweet

Related Posts

ESET previews new AI security features to secure chatbot communications and AI workflows
Future

ESET previews new AI security features to secure chatbot communications and AI workflows

April 21, 2026

ESET announced upcoming AI protection capabilities designed to safeguard how employees interact with AI tools. Demonstrated at RSAC 2026 and...

NetApp’s new research finds AI is now foundational to modern marketing
Future

NetApp’s new research finds AI is now foundational to modern marketing

April 21, 2026

NetApp announced its participation in a new marketing research study conducted by Callan Consulting, a Silicon Valley executive marketing consulting...

Discussion about this post

Latest Issue

Why wait for the future, if we can just simulate it

Why wait for the future, if we can just simulate it

April 21, 2026
ESET previews new AI security features to secure chatbot communications and AI workflows

ESET previews new AI security features to secure chatbot communications and AI workflows

April 21, 2026
NetApp’s new research finds AI is now foundational to modern marketing

NetApp’s new research finds AI is now foundational to modern marketing

April 21, 2026

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
    • CX50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX x AI Everything
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.