Hello,
I am currently receiving SMS messages trying to distribute the Android based FLU BOT malware.
The script that the websites run can detect the legitimacy of the operating system. If you try to access the website hosting the malware on anything other than an Android device, it re-directs you to a legitimate website.
Thus, I have tried user agent switchers and Android emulators, however, it can still detect that i am not using the actual operating system.
I have made sure the screen resolution is that of a mobile device. The IP range of the desktop is a non-mobile ISP, however I don't think that would be the issue as surely victims would access the malware website on their private WiFi connection? Browser leakage websites also cannot detect the OS on the desktop when using an emulator.
Is anyone aware of how they are detecting the operating system (fingerprinting)?
I am currently receiving SMS messages trying to distribute the Android based FLU BOT malware.
The script that the websites run can detect the legitimacy of the operating system. If you try to access the website hosting the malware on anything other than an Android device, it re-directs you to a legitimate website.
Thus, I have tried user agent switchers and Android emulators, however, it can still detect that i am not using the actual operating system.
I have made sure the screen resolution is that of a mobile device. The IP range of the desktop is a non-mobile ISP, however I don't think that would be the issue as surely victims would access the malware website on their private WiFi connection? Browser leakage websites also cannot detect the OS on the desktop when using an emulator.
Is anyone aware of how they are detecting the operating system (fingerprinting)?