Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers use NFCGate to steal funds through mobile payments
Global Security

Hackers use NFCGate to steal funds through mobile payments

AdminBy AdminNovember 20, 2024No Comments3 Mins Read
Mobile Payments
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 20, 2024Ravi LakshmananPayment Security / Cybercrime

Mobile payments

Threat actors are increasingly banking on a new technique that uses near-field communication (NFC) to capture a victim’s funds at scale.

Technique under the code name Ghost faucet by ThreatFabric, allows cybercriminals to cash out stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relay NFC traffic.

“Criminals can now abuse Google Pay and Apple Pay to transmit your click-to-pay information worldwide in seconds,” Dutch security firm The Hacker News said in a statement. “This means that even without your physical card or phone, they can make payments from your account anywhere in the world.”

These attacks typically work by tricking victims into downloading mobile banking malware that can capture their banking credentials and one-time passwords using a masking attack or keylogger. Additionally, it may include a voice phishing component.

Cyber ​​security

After receiving the card data, attackers proceed to link the card to Google Pay or Apple Pay. But in an attempt to avoid the card being blocked by the issuer, the tap-to-pay information is passed on to the mullah responsible for fraudulent in-store purchases.

This is achieved through a legitimate research tool called NFC gatewaywhich can capture, analyze or modify NFC traffic. It can also be used to transfer NFC traffic between two devices using a server.

“One device works as a ‘reader’ that reads the NFC tag, the other emulates the NFC tag using Host Card Emulation (HCE),” say the researchers from the TU Darmstadt Secure Mobile Networks Laboratory.

While NFCGate has previously been used by attackers to transmit NFC information from victim devices to the attacker, such as documented ESET back in August 2024 with the NGate malware, the latest development marks the first case of the data transmission tool being misused.

Mobile payments

“Cybercriminals can establish a relay between the device with the stolen card and the PoS (point of sale) terminal at the retailer, remaining anonymous and performing cashing at scale,” ThreatFabric noted.

“A cybercriminal with a stolen card can be far from the location (even in another country) where the card will be used, and use the same card in multiple locations within a short period of time.”

This tactic has the added advantage of being able to be used to purchase gift cards from offline retailers without the physical presence of cybercriminals. Worse, it can be used to scale a fraudulent scheme by enlisting the help of multiple mules in different locations in a short period of time.

Cyber ​​security

Ghost Tap attacks are made more difficult to detect by the fact that transactions appear to originate from a single device, bypassing anti-fraud mechanisms. A device with a tethered card can also be in flight mode, which can make it difficult to detect their true location and that it wasn’t actually used to make a transaction at a PoS terminal.

“We suspect that the evolution of networks with increased communication speeds, together with the lack of proper time detection at ATM/POS terminals, has made these attacks possible when the actual card devices are physically far from where the transaction takes place. done (device not present at PoS or ATM),” ThreatFabric noted.

“With the ability to scale quickly and operate anonymously, this cash-out method presents significant challenges for both financial institutions and retail businesses.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.