Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

February 6, 2026

New Password-Stealing Phishing Campaign Targets Dropbox Credentials

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
Cyber Security

Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

Team-CWDBy Team-CWDJanuary 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new wave of Android malware has been enabling cybercriminals to carry out unauthorized tap-to-pay transactions without physical access to victims’ bank cards.

The activity, documented in an advisory published today by Group-IB researchers, involves NFC-enabled applications sold and promoted within Chinese-language cybercrime communities on Telegram.

More than 54 malicious APK samples have been identified, many disguised as legitimate financial or payment apps. Once installed, the malware allows attackers to relay near-field communication (NFC) data remotely, making fraudulent transactions appear as legitimate in-person payments.

Victims are typically targeted through smishing and vishing campaigns. They are persuaded to install the malicious app and tap their payment card against their phone. From there, card data is transmitted via a command-and-control (C2) server to a criminal-controlled device, which completes transactions using illicitly obtained point-of-sale (POS) terminals.

How the Tap-to-Pay Scheme Works

The scam generally relies on two coordinated applications:

In some cases, criminals bypass direct victim interaction altogether. Mobile wallets preloaded with compromised cards are instead used by mule networks to make purchases in physical stores across multiple countries.

Read more on NFC payment fraud: SuperCard X Enables Contactless ATM Fraud in Real-Time

Group-IB identified several prominent vendors operating on Telegram, including TX-NFC, X-NFC and NFU Pay. These groups sell access to tap-to-pay malware for fees ranging from short-term trials to multi-month subscriptions. TX-NFC alone has reportedly amassed more than 21,000 subscribers, offering customer support and tailored builds for different regions.

Between November 2024 and August 2025, at least $355,000 in illegitimate transactions were linked to one POS terminal vendor advertising openly on Telegram. Receipts of successful cash-outs were frequently shared to promote credibility.

A Growing Global Impact

Law enforcement advisories and arrests across Europe, Asia and the US point to the expanding reach of these schemes. 

Cases in the Czech Republic, Singapore, Malaysia and the US have all involved suspects using mobile devices to conduct contactless payments without physical cards.

According to Group-IB, detections of tap-to-pay malware steadily increased from mid-2024 through late 2025. New variants continue to emerge while older ones remain active, suggesting the technique is spreading among fraud networks rather than being replaced.

To defend against this and similar threats, Group-IB recommended a combination of user education and enhanced fraud monitoring.

The firm advised financial institutions to raise awareness around smishing and vishing campaigns, monitor for rapid card enrolments in mobile wallets and watch for transactions occurring in quick succession across wide geographic areas.

Group-IB also urged stronger merchant vetting and improved know-your-customer (KYC) checks, alongside the use of threat intelligence and fraud protection tools to detect malicious applications and abnormal behavior on user devices.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePersonal LLM Accounts Drive Shadow AI Data Leak Risks
Next Article Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.