Ghost Tap Malware Drives Spike in Contactless Payment Scams

In the evolving landscape of cyber threats, a sophisticated Android-based malware known as Ghost Tap is now said to be behind a notable increase in fraudulent contactless payments. This malicious software allows cybercriminals to execute tap-to-pay transactions remotely, bypassing the need for direct access to victims’ physical bank cards.

Discovered through detailed analysis by cybersecurity professionals, Ghost Tap represents a growing risk in the realm of near-field communication (NFC) exploitation, where attackers can siphon funds without ever handling the card itself.

The malware‘s origins trace back to underground markets within Chinese-speaking online communities, where it’s marketed and distributed via platforms like Telegram.

Researchers have identified over 50 variants of harmful Android application packages (APKs), often masquerading as trustworthy banking or payment tools.

Vendors such as TX-NFC, X-NFC, and NFU Pay promote these tools through dedicated channels, some boasting subscriber counts exceeding 20,000.

Access is sold on a subscription model, with options for trial periods or extended use, making it accessible to a wide array of fraudsters.

This commercialization has accelerated its spread, with detections rising consistently from mid-2024 onward.

At its core, Ghost Tap operates through a dual-app system designed for seamless data relay.

One component, dubbed the “reader” app, is covertly installed on the victim’s smartphone.

It tricks users into tapping their payment card against the device, capturing essential NFC details like card numbers and expiration dates.

This information is then funneled through a command-and-control (C2) server to a second “tapper” app controlled by the attacker.

From there, criminals can initiate transactions using unauthorized point-of-sale (POS) devices.

In more advanced schemes, perpetrators preload compromised card data into mobile wallets, enlisting networks of accomplices—often referred to as mules—to make purchases in brick-and-mortar stores across borders.

This method mimics legitimate in-person buys, evading many traditional fraud detection systems.

Attackers employ deceptive tactics to deploy the malware, primarily through SMS phishing (smishing) and voice phishing (vishing) campaigns.

These social engineering ploys convince users to download the fake apps, often under the guise of urgent financial updates or promotions.

Once active, the malware facilitates large-scale fraud. For instance, one Telegram-based POS service provider was connected to over $355,000 in unauthorized transactions between late 2024 and mid-2025.

Vendors frequently share proof-of-concept receipts to build trust and attract more clients, perpetuating the cycle.

Law enforcement actions, including arrests in regions like Europe, Asia, and North America, underscore the international scope of these operations, with suspects caught using mobile setups for cardless payments.

The repercussions for victims are severe, manifesting as unexplained charges that drain accounts without obvious signs of compromise.

Android devices equipped with NFC are the primary targets, but the fraud‘s ripple effects span globally, affecting consumers in countries including the Czech Republic, Singapore, Malaysia, and the United States.

Mule networks exacerbate the issue by conducting transactions in diverse locations, making it harder for banks to flag anomalies.

To combat this, industry professionals now advocate a multi-layered defense strategy.

Public awareness campaigns should emphasize the dangers of unsolicited messages urging app downloads.

Financial institutions are urged to implement proper monitoring for unusual patterns, such as sudden wallet enrollments or clustered transactions over vast distances.

Enhanced merchant verification, stricter customer identity checks, and integration of advanced threat detection software can help identify suspicious apps early.

By combining user vigilance with technological safeguards, the tide of remote NFC fraud can be stemmed, protecting the integrity of contactless payment systems in an increasingly digital environment.



Sponsored Links by DQ Promote

 

 

 
Send this to a friend