Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Supercard x Android Malware Enables Contactless ATM and POS Scams via NFC Relay Attack
Identity

Supercard x Android Malware Enables Contactless ATM and POS Scams via NFC Relay Attack

userBy userApril 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 21, 2025Ravi LakshmananTechnology/Mobile Security

Super Card x Android Malware

A new Android Malware (MAAS) platform named Supercard X promotes near-field communication (NFC) relay attacks, allowing cybercriminals to carry out fraudulent cashouts.

The Active Campaign aims to infringe payment card data on customers from Italian banking institutions and card issuers, fraud prevention company Cleef said in an analysis. There is evidence to suggest that the service is being promoted on telegram channels.

Supercard X employs a multi-stage approach that combines social engineering (smithing and via telephone), malicious application installation, and NFC data interception for highly effective fraud.

Cybersecurity

The new Android malware, a work by Chinese-speaking threat actors, has been observed to be propagated through three different fake apps, which will lead victims to install them via social engineering techniques such as deceit SMS and WhatsApp messages –

verifica carta (io.dxpay.remotenfc.supercard11) Supercard X (io.dxpay.remotenfc.supercard) Kingcard nfc (io.dxpay.remotenfc.supercard)

Messages can cause false sense of urgency by impersonating a bank security alert and urging recipients to call a specific number to challenge the transaction.

The infection chain then moves to what is called telephone-oriented attack delivery (TOAD). There, threat actors manipulate the victim and install the app in pose as security software through direct telephone conversations. Threat actors have been found to employ compelling tactics to collect victim pins and instruct them to remove existing card restrictions.

Super Card x Android Malware

At the core of the operation is NFC relay technology that has not been previously documented, where threat actors unauthorizedly allow POS (POS) payments and automatic teller machine (ATM) withdrawals by intercepting and relaying NFC communications from infected devices.

To do this, the attacker will encourage the victim to bring their debit or credit card closer to the mobile device. This allows Super Card X malware to secretly capture the details of the card that was sent to and communicate it to an external server. Harvested card information is used by threat actor-controlled devices to carry out unauthorized transactions.

The application distributed to the victim to capture NFC card data is called a reader. A similar app known as Tapper is installed on threat actor devices to receive card information. Communication between readers and Tupper is performed using Command and Control (C2) using HTTP, which requires cybercriminals to be logged in.

As a result, threat actors are expected to create accounts within the Super Card X platform before distributing malicious apps. The victim is then instructed to enter the login credentials provided during the call.

This step can act as a critical COG for the overall attack, as it establishes a link between the victim’s infectious device and the threat actor’s Tapper instance, and then relay card data for subsequent cash-outs. The Tapper app is designed to emulate the victim’s card using stolen data, which tricks POS devices and ATMs into identifying them as legitimate cards.

Cybersecurity

The “Reader” malware artifact identified by Cleafy makes subtle differences in the login screen and is a custom build generated by affiliate actors, indicating that you can adjust your campaigns according to your needs. Additionally, SuperCard X uses mutual TLS (MTL) to ensure communication with the C2 infrastructure.

That threat actor can deceive unsuspecting users and deceive them from changing important settings on the phone. This is not noticed by Google. It is said to be working on a new Android feature that effectively blocks the installation of apps from unknown sources and gives permission to accessibility services.

Currently, there is no evidence that Supercard X is being distributed through the Google Play Store, but we recommend that users scrutinize the app’s description, permissions and reviews before downloading. We also recommend that you enable Google Play Protective to protect your device from new threats.

“This new campaign will go beyond the traditional goals of banking institutions and introduce important financial risks that directly affect payment providers and credit card issuers,” the researchers said.

“The innovative combination of malware and NFC relays allows attackers to perform fraudulent cash-outs on debit and credit cards. This method has shown high effectiveness, especially when targeting contactless ATM withdrawals.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article20 new technology unicorns were cast in 2025
Next Article Upexi raises $100 million to buy Solana Crypto Token
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.