Description

A newly discovered version of the NGate Android malware has taken advantage of Near Field Communication (NFC) technology to obtain banking card information, along with the attached Personal Identification Number (PIN). Attackers were seen to be using a genuine NFC app, which is used for payments, to embed the malicious code, and subsequently make fake transactions as well as obtain the stolen information through ATM withdrawals. This attack shows a growing trend of sophistication in mobile financial malware and how it can be hidden in applications deemed safe by the user. The method of attack is based on trojanizing the HandyPay application; a legitimate NFC relay application but changing its original version and adding malicious functionality to allow the threat actor to be able to capture and transmit NFC communication between the physical payment card of the victim and devices owned by the attacker in real-time when performing NFC transactions. To gain access to the card PIN of the victim, the user is typically persuaded to enter their PIN through social engineering, and upon entering their PIN, they would tap their payment card to the infected device. The malware captures transaction data such as encrypted banking card details and then transmits this data to the attacker. Therefore, enabling the attacker to use the victim's banking card on a different device to carry out unauthorised contactless payments and take cash from an ATM. The malware is primarily distributed through phishing campaigns, fake websites and illegal downloadable apps.