New Malware Steals Card Data Through NFC Taps

New Malware Steals Card Data Through NFC Taps

The simple, convenient act of tapping a payment card to a smartphone has been ingeniously weaponized by a sophisticated cyber campaign, transforming a feature designed for ease of use into a silent tool for financial theft. A new and highly evasive form of Android malware, dubbed “Ghost Tap,” is at the center of this emerging threat, which is being deployed by Chinese threat actors on a global scale. This malicious software is specifically engineered to leverage a device’s Near Field Communication (NFC) capabilities, allowing it to surreptitiously intercept and steal sensitive payment card information directly from the physical card. When a victim taps their card against their own infected phone, the malware captures the data in an instant, relaying it to criminals without leaving any immediate trace. The campaign’s success hinges on its ability to remain completely hidden from the user while it waits for the perfect moment to strike, turning the device into a portable digital skimmer. This development represents a significant escalation in mobile payment threats, exploiting user trust in commonplace technology.

A Deceptive Distribution and Covert Operation

The infiltration method for Ghost Tap relies almost entirely on cunning social engineering tactics designed to deceive unsuspecting users into compromising their own devices. The threat actors disseminate the malware through popular but often unregulated communication channels, such as Telegram and other third-party messaging platforms. Here, the malicious software is cleverly disguised as a wide range of desirable applications, including popular games, utility tools, or even productivity software that promises to enhance the user’s mobile experience. Lured by the prospect of a free or useful app, users download and install the software, unknowingly planting the malware on their device. During the installation process, the application presents a series of permission requests, one of which is access to the device’s NFC functionality. For many users, this request may seem innocuous or necessary for the app’s purported function, leading them to grant it without a second thought. This single moment of consent is all the malware needs to activate its primary payload and begin its covert surveillance for financial data.

Once installed and granted the necessary permissions, Ghost Tap transitions into a stealthy operational mode, functioning as a persistent and invisible threat deep within the Android operating system. The malware runs silently in the background, continuously monitoring the device’s NFC hardware for any interaction with a compatible payment card. The moment a card is brought within proximity of the infected phone—for example, if a user holds their wallet against their device—the malware instantly reads the sensitive card data, including the card number and expiration date. This information is then immediately encrypted and transmitted to remote command-and-control servers managed by the attackers. According to security researchers who have analyzed over 54 unique samples of this malware, the stolen data is quickly funneled to fraud networks. These criminal enterprises then use the compromised card details to conduct unauthorized transactions, often through illicitly programmed point-of-sale (POS) terminals that bypass standard security checks, draining victim accounts before the theft is even discovered.

Advanced Evasion and Proactive Defense

A particularly alarming characteristic of the Ghost Tap malware was its sophisticated persistence mechanism, which made its removal exceptionally difficult for the average user. To ensure its longevity on an infected device, the malware employed advanced evasion techniques that embedded it deep within the system’s core functions. It registered itself as a critical system service, allowing it to launch automatically upon startup and operate with elevated privileges. Furthermore, it hooked directly into the Android NFC framework, enabling it to function independently of the original host application that was used for its delivery. This meant that even if the user identified and uninstalled the deceptive app, the core malicious service remained active. In its most advanced variants, the malware could leverage compromised system processes to automatically reinstall itself, effectively thwarting manual removal attempts and ensuring the device remained a tool for the attackers. This level of persistence highlighted the malware’s design as a long-term threat intended for continuous data harvesting.

subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address