Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • 15-second semicylinder air tent unboxes from the cube
    • Emergency First Responders Say Waymos Are Getting Worse
    • Motorola Razr Fold vs. Samsung Galaxy Z Fold 7: How the Book-Style Phones Compare
    • Agentic AI: How to Save on Tokens
    • Lightweight ebike conversion kit electrifies your bike
    • Taylor Swift Wants to Trademark Her Likeness. These TikTok Deepfake Ads Show Why
    • New Releases on Prime Video in May 2026: Jack Reacher, Spider-Noir and More
    • 4 YAML Files Instead of PySpark: How We Let Analysts Build Data Pipelines Without Engineers
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, April 30
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Android malware steals payment card data using previously unseen technique
    News

    Android malware steals payment card data using previously unseen technique

    Editor Times FeaturedBy Editor Times FeaturedAugust 26, 2024No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Newly found Android malware steals cost card information utilizing an contaminated machine’s NFC reader and relays it to attackers, a novel approach that successfully clones the cardboard so it may be used at ATMs or point-of-sale terminals, safety agency ESET stated.

    ESET researchers have named the malware NGate as a result of it incorporates NFCGate, an open supply software for capturing, analyzing, or altering NFC visitors. Quick for Near-Field Communication, NFC is a protocol that enables two units to wirelessly talk over brief distances.

    New Android assault situation

    “It is a new Android assault situation, and it’s the first time now we have seen Android malware with this functionality getting used within the wild,” ESET researcher Lukas Stefanko stated in a video demonstrating the invention. “NGate malware can relay NFC information from a sufferer’s card by way of a compromised machine to an attacker’s smartphone, which is then in a position to emulate the cardboard and withdraw cash from an ATM.”

    Lukas Stefanko—Unmasking NGate.

    The malware was put in by way of conventional phishing situations, such because the attacker messaging targets and tricking them into putting in NGate from short-lived domains that impersonated the banks or official cell banking apps out there on Google Play. Masquerading as a authentic app for a goal’s financial institution, NGate prompts the person to enter the banking shopper ID, date of delivery, and the PIN code equivalent to the cardboard. The app goes on to ask the person to activate NFC and to scan the cardboard.

    ESET stated it found NGate getting used in opposition to three Czech banks beginning in November and recognized six separate NGate apps circulating from non-Google Play sources between then and March of this yr. Among the apps utilized in later months of the marketing campaign got here within the type of PWAs, brief for Progressive Web Apps, which as reported Thursday may be put in on each Android and iOS units even when settings (necessary on iOS) forestall the set up of apps out there from non-official sources.

    The most definitely purpose the NGate marketing campaign resulted in March, ESET stated, was the arrest by Czech police of a 22-year-old they stated they caught sporting a masks whereas withdrawing cash from ATMs in Prague. Investigators stated the suspect had “devised a brand new technique to con individuals out of cash” utilizing a scheme that sounds an identical to the one involving NGate.

    Stefanko and fellow ESET researcher Jakub Osmani defined how the assault labored:

    The announcement by the Czech police revealed the assault situation began with the attackers sending SMS messages to potential victims a couple of tax return, together with a hyperlink to a phishing web site impersonating banks. These hyperlinks most definitely led to malicious PWAs. As soon as the sufferer put in the app and inserted their credentials, the attacker gained entry to the sufferer’s account. Then the attacker referred to as the sufferer, pretending to be a financial institution worker. The sufferer was knowledgeable that their account had been compromised, probably because of the earlier textual content message. The attacker was really telling the reality – the sufferer’s account was compromised, however this fact then led to a different lie.

    To “shield” their funds, the sufferer was requested to alter their PIN and confirm their banking card utilizing a cell app – NGate malware. A hyperlink to obtain NGate was despatched through SMS. We suspect that inside the NGate app, the victims would enter their previous PIN to create a brand new one and place their card behind their smartphone to confirm or apply the change.

    Because the attacker already had entry to the compromised account, they might change the withdrawal limits. If the NFC relay technique didn’t work, they might merely switch the funds to a different account. Nevertheless, utilizing NGate makes it simpler for the attacker to entry the sufferer’s funds with out leaving traces again to the attacker’s personal checking account. A diagram of the assault sequence is proven in Determine 6.

    NGate attack overview.
    Enlarge / NGate assault overview.

    ESET

    The researchers stated NGate or apps much like it might be utilized in different situations, equivalent to cloning some good playing cards used for different functions. The assault would work by copying the distinctive ID of the NFC tag, abbreviated as UID.

    “Throughout our testing, we efficiently relayed the UID from a MIFARE Basic 1K tag, which is often used for public transport tickets, ID badges, membership or pupil playing cards, and comparable use instances,” the researchers wrote. “Utilizing NFCGate, it’s potential to carry out an NFC relay assault to learn an NFC token in a single location and, in actual time, entry premises in a distinct location by emulating its UID, as proven in Determine 7.”

    Figure 7. Android smartphone (right) that read and relayed an external NFC token’s UID to another device (left).
    Enlarge / Determine 7. Android smartphone (proper) that learn and relayed an exterior NFC token’s UID to a different machine (left).

    ESET

    The cloning may all happen in conditions the place the attacker has bodily entry to a card or is ready to briefly learn a card in unattended purses, wallets, backpacks, or smartphone instances holding playing cards. To carry out and emulate such assaults requires the attacker to have a rooted and customised Android machine. Telephones that have been contaminated by NGate didn’t have this requirement.

    A Google consultant wrote in an e mail: “Primarily based on our present detections, no apps containing this malware are discovered on Google Play. Android customers are routinely protected in opposition to recognized variations of this malware by Google Play Shield, which is on by default on Android units with Google Play Providers. Google Play Shield can warn customers or block apps recognized to exhibit malicious habits, even when these apps come from sources exterior of Play.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

    April 29, 2026

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Alberta online gambling expansion sparks concern among First Nations casino operators

    April 29, 2026

    Better Markets urges courts to let states regulate prediction markets, not CFTC

    April 29, 2026

    Q&A with Sam Altman and AWS CEO Matt Garman about OpenAI’s new partnership with AWS, Bedrock Managed Agents, Trainium chips, and more (Ben Thompson/Stratechery)

    April 28, 2026

    Snapchat launches AI Sponsored Snaps, a conversational ad format in the Chat tab that lets users talk to brand-specific AI agents for product recommendations (Aisha Malik/TechCrunch)

    April 28, 2026

    Comments are closed.

    Editors Picks

    15-second semicylinder air tent unboxes from the cube

    April 30, 2026

    Emergency First Responders Say Waymos Are Getting Worse

    April 29, 2026

    Motorola Razr Fold vs. Samsung Galaxy Z Fold 7: How the Book-Style Phones Compare

    April 29, 2026

    Agentic AI: How to Save on Tokens

    April 29, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Fabriq, a Paris-based scale-up, lands €22 million to become the global standard in industrial performance

    June 5, 2025

    9 Best Keyboards (2025), Tested and Reviewed

    August 23, 2025

    Samsung Introduces Galaxy A23 5G in the US

    September 22, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.