Hackers Exploit NFC in New Android Payment Fraud Scheme

Article Highlights
Off On

Hackers are exploiting near-field communication (NFC) technology to commit instant payment fraud through the Chinese-speaking Android malware-as-a-service platform, SuperCard X. This malware enables real-time theft by using NFC to capture payment card data and make fraudulent transactions at point of sale (PoS) terminals and ATMs.

Unlike older methods such as overlay attacks or SMS interception, SuperCard X uses contactless functionalities in modern payment cards. Infected Android devices become NFC relay stations, simplifying the fraud process. Users of SuperCard X access “Reader” and “Tapper” applications via Telegram channels, making NFC relay fraud easily accessible without complex tool development.

The attack starts with spoofed messages from banks urging victims to call a number. Scammers then pose as bank agents, instructing victims to install the SuperCard X Reader app disguised as security software. This app requires minimal NFC permissions and standard system permissions, avoiding detection by security software.

When victims tap their card against the infected device, the Reader app captures NFC-transmitted card data. This data, including Answer To Reset (ATR) messages, is sent in real-time to the attackers. The Tapper app on another device uses the relayed ATRs to emulate the victim’s card, allowing for transactions at contactless PoS terminals and ATMs. Fraudulent withdrawals increase after convincing victims to lift spending limits. SuperCard X is distinct from other Android banking Trojans, focusing on NFC relay with minimal permissions, evading most antivirus engines. An analysis by Cleafy found extensive code reuse from open-source projects, indicating quick development and easy onboarding for affiliates.

In an Italian campaign, Cleafy noted customizations like tailored APK repackaging and pre-generated login credentials, streamlining the attack. SuperCard X highlights advanced social engineering and strategic minimalism in permissions, challenging current cybersecurity defenses with its covert and effective methods.

Explore more

Agency Management Software – Review

Setting the Stage for Modern Agency Challenges Imagine a bustling marketing agency juggling dozens of client campaigns, each with tight deadlines, intricate multi-channel strategies, and high expectations for measurable results. In today’s fast-paced digital landscape, marketing teams face mounting pressure to deliver flawless execution while maintaining profitability and client satisfaction. A staggering number of agencies report inefficiencies due to fragmented

Edge AI Decentralization – Review

Imagine a world where sensitive data, such as a patient’s medical records, never leaves the hospital’s local systems, yet still benefits from cutting-edge artificial intelligence analysis, making privacy and efficiency a reality. This scenario is no longer a distant dream but a tangible reality thanks to Edge AI decentralization. As data privacy concerns mount and the demand for real-time processing

SparkyLinux 8.0: A Lightweight Alternative to Windows 11

This how-to guide aims to help users transition from Windows 10 to SparkyLinux 8.0, a lightweight and versatile operating system, as an alternative to upgrading to Windows 11. With Windows 10 reaching its end of support, many are left searching for secure and efficient solutions that don’t demand high-end hardware or force unwanted design changes. This guide provides step-by-step instructions

Mastering Vendor Relationships for Network Managers

Imagine a network manager facing a critical system outage at midnight, with an entire organization’s operations hanging in the balance, only to find that the vendor on call is unresponsive or unprepared. This scenario underscores the vital importance of strong vendor relationships in network management, where the right partnership can mean the difference between swift resolution and prolonged downtime. Vendors

Immigration Crackdowns Disrupt IT Talent Management

What happens when the engine of America’s tech dominance—its access to global IT talent—grinds to a halt under the weight of stringent immigration policies? Picture a Silicon Valley startup, on the brink of a groundbreaking AI launch, suddenly unable to hire the data scientist who holds the key to its success because of a visa denial. This scenario is no