Malware Enables Criminals to Illegally Obtain Near Field Communication Data

New research conducted by cybersecurity company ESET has uncovered a new cyberattack campaign targeting Android users. The attack utilizes a complex social engineering scheme and new Android malware to steal users’ near field communication data, allowing the cybercriminals to withdraw cash from NFC-enabled ATMs.

Initially, the threat actor used progressive web app technology to trick users into installing malicious apps from websites outside of the Play Store. These apps, accessed through supported browsers, could lead users to phishing websites to collect sensitive information. The threat actor then switched to using WebAPKs, a more advanced form of PWA, to create standalone apps that appear legitimate but are actually malicious.

The attack also involves the distribution of a new malware called NGate, which tricks users into providing banking information through a fake website. The malware also embedded a tool called NFCGate, allowing the cybercriminals to relay NFC data between devices. The stolen information can be used for traditional fraud or to withdraw money from NFC-enabled ATMs.

The campaign has been identified in the Czech Republic, where a suspect has been arrested. However, there is a possibility of the attack spreading to other regions. To protect against this threat, users are advised to verify the source of applications, avoid downloading software from unofficial sources, and avoid sharing payment card PIN codes. Additionally, users should deactivate NFC when not in use and use virtual cards stored securely on devices. Security software should also be installed on mobile devices to detect malware.

Unlock your business potential with our expert guidance. Get in touch now!

transport-speed-distribution-logistics-adobe.jpg

Digital Catapult Celebrates Shared Infrastructure as a Pathway to Decarbonizing the Logistics Sector

delimited-list-word-tutorial.jpeg

5 Ways to Delete a Page in Word

identity-diversity-people-reshidea-adobe.jpg

From Beauty Icon to Tech Trailblazer: This Year’s Most Influential Woman in UK Technology

tr_20241119-debian-vs-ubuntu.jpg

Which Linux Distribution Is Right for You?

what-is-twake.jpeg

10 Top Free Project Management Tools and Software

tr_20241115-anz-cio-challenges-ai-cybersecurity.jpg

AI, Cybersecurity, and Data Analytics: Trends and Innovations for 2025

tr_20241115-ubuntu-server-the-smart-persons-guide.jpg

Ubuntu Server Quick Reference Guide