Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsGhost Tap Malware Fuels Surge in Remote NFC Payment Fraud
Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
Cybersecurity

Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

•January 7, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Jan 7, 2026

Companies Mentioned

Telegram

Telegram

Why It Matters

Remote NFC fraud bypasses traditional card‑present controls, exposing banks and merchants to a scalable, hard‑to‑detect loss vector that threatens the credibility of contactless payments.

Key Takeaways

  • •54 malicious APKs mimic legitimate finance apps
  • •Remote NFC data relayed via C2 servers
  • •Telegram vendors charge subscriptions, 21,000 users
  • •$355K fraud linked to single POS vendor
  • •Law enforcement sees cases across Europe, Asia, US

Pulse Analysis

The Ghost Tap malware represents a paradigm shift in contactless payment abuse, moving the attack surface from physical POS terminals to the victim’s smartphone. By exploiting Android’s NFC stack, the malware captures card credentials when users tap their cards to a compromised device, then forwards the data to a command‑and‑control server. This remote relay allows fraudsters to complete transactions anywhere, effectively turning a single compromised phone into a portable point‑of‑sale. The ecosystem around the malware is highly commercialized; vendors on Telegram offer trial periods and multi‑month subscriptions, providing custom builds for different regions and technical support for over twenty‑one thousand subscribers. Such a service model accelerates adoption and lowers the barrier to entry for low‑skill actors, amplifying the threat’s reach.

Financial institutions are now confronting a fraud vector that sidesteps traditional card‑present safeguards such as chip‑and‑pin verification and tokenization. The rapid succession of transactions across disparate geographies, combined with swift mobile‑wallet enrolments, challenges existing monitoring systems that rely on location and velocity heuristics. Moreover, the use of mule networks and compromised POS terminals blurs the line between genuine and fraudulent activity, complicating investigations. Regulators across the Czech Republic, Singapore, Malaysia and the United States have already issued alerts, underscoring the need for coordinated cross‑border intelligence sharing.

Mitigation requires a layered approach: user education to curb smishing and vishing lures, enhanced fraud detection that flags anomalous NFC enrolments, and stricter merchant vetting to prevent compromised POS devices from entering the supply chain. Banks should integrate threat‑intelligence feeds that identify known malicious app signatures and monitor for C2 traffic patterns. As remote NFC fraud matures, the industry must evolve its risk models and invest in behavioral analytics to preserve consumer confidence in contactless payments. The ongoing arms race between fraudsters and defenders will shape the future of mobile payment security.

Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...