Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads

January 7, 2026

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

January 7, 2026

Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

January 7, 2026
Facebook X (Twitter) Instagram
Wednesday, January 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
Cyber Security

Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

Team-CWDBy Team-CWDJanuary 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new wave of Android malware has been enabling cybercriminals to carry out unauthorized tap-to-pay transactions without physical access to victims’ bank cards.

The activity, documented in an advisory published today by Group-IB researchers, involves NFC-enabled applications sold and promoted within Chinese-language cybercrime communities on Telegram.

More than 54 malicious APK samples have been identified, many disguised as legitimate financial or payment apps. Once installed, the malware allows attackers to relay near-field communication (NFC) data remotely, making fraudulent transactions appear as legitimate in-person payments.

Victims are typically targeted through smishing and vishing campaigns. They are persuaded to install the malicious app and tap their payment card against their phone. From there, card data is transmitted via a command-and-control (C2) server to a criminal-controlled device, which completes transactions using illicitly obtained point-of-sale (POS) terminals.

How the Tap-to-Pay Scheme Works

The scam generally relies on two coordinated applications:

In some cases, criminals bypass direct victim interaction altogether. Mobile wallets preloaded with compromised cards are instead used by mule networks to make purchases in physical stores across multiple countries.

Read more on NFC payment fraud: SuperCard X Enables Contactless ATM Fraud in Real-Time

Group-IB identified several prominent vendors operating on Telegram, including TX-NFC, X-NFC and NFU Pay. These groups sell access to tap-to-pay malware for fees ranging from short-term trials to multi-month subscriptions. TX-NFC alone has reportedly amassed more than 21,000 subscribers, offering customer support and tailored builds for different regions.

Between November 2024 and August 2025, at least $355,000 in illegitimate transactions were linked to one POS terminal vendor advertising openly on Telegram. Receipts of successful cash-outs were frequently shared to promote credibility.

A Growing Global Impact

Law enforcement advisories and arrests across Europe, Asia and the US point to the expanding reach of these schemes. 

Cases in the Czech Republic, Singapore, Malaysia and the US have all involved suspects using mobile devices to conduct contactless payments without physical cards.

According to Group-IB, detections of tap-to-pay malware steadily increased from mid-2024 through late 2025. New variants continue to emerge while older ones remain active, suggesting the technique is spreading among fraud networks rather than being replaced.

To defend against this and similar threats, Group-IB recommended a combination of user education and enhanced fraud monitoring.

The firm advised financial institutions to raise awareness around smishing and vishing campaigns, monitor for rapid card enrolments in mobile wallets and watch for transactions occurring in quick succession across wide geographic areas.

Group-IB also urged stronger merchant vetting and improved know-your-customer (KYC) checks, alongside the use of threat intelligence and fraud protection tools to detect malicious applications and abnormal behavior on user devices.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePersonal LLM Accounts Drive Shadow AI Data Leak Risks
Next Article Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Team-CWD
  • Website

Related Posts

Cyber Security

High-Severity Flaw in Open WebUI Affects AI Connections

January 6, 2026
Cyber Security

Ilya Lichtenstein Released Early After Bitfinex Hack Conviction

January 5, 2026
Cyber Security

European Space Agency Confirms Server Breach

January 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

What’s at stake if your employees post too much online

December 1, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.