Android Malware Steals Card NFC Data for Fraudulent ATM Withdrawals

SeniorTechInfo
3 Min Read

The Rise of NGate Malware: A New Threat Targeting Android Users

In the ever-evolving landscape of digital threats, a new Android malware has emerged, specifically designed to phish victims’ card details and transmit sensitive information to attackers for ATM withdrawals. This sophisticated crimeware campaign, discovered by security researchers at ESET, has been targeting customers at three Czech banks since March 2024.

The malware, named NGate, is a novel malicious software that is covertly downloaded onto victims’ devices through a multi-stage phishing campaign. Once installed, NGate displays a fake website that prompts victims to enter their banking information, which is then sent directly to the attacker’s server.

What sets NGate apart is its unique functionality called “NFCGate,” which enables the relay of near field communication (NFC) data between the victim’s device and the attacker’s device. NFC technology is commonly used for contactless payments in stores and ATM withdrawals when combined with the user’s PIN.

Victims are tricked into providing information such as their banking customer ID, date of birth, and card’s PIN code. They are also instructed to turn on NFC on their smartphones and place their payment card next to the device until the malicious app recognizes the card, as explained by ESET.

Armed with the stolen NFC data and PIN, attackers can impersonate victims at ATMs to withdraw cash. In cases where this method fails, attackers still have the phished banking information to access victims’ accounts and transfer funds. Additionally, the NGate malware could also be used to read contactless card data in physical proximity, allowing for small contactless payments to be made.

How NGate Malware Operates:

  • Attacker sends a phishing link to the victim via SMS
  • Victim installs a malicious lookalike banking app, unknowingly providing banking information
  • Phished banking credentials are sent to the attacker’s server
  • Attacker impersonates a banking official, convincing victims to change their PIN and verify their card through the malicious app
  • Victim downloads the NGate malware via an SMS link provided by the attacker
  • NGate captures the victim’s PIN and NFC traffic from their payment card

ESET malware researcher, Lukáš Štefanko, emphasizes the importance of proactive measures to protect against such complex attacks, including vigilance against phishing, social engineering, and Android malware. This includes checking website URLs, downloading apps from official stores, safeguarding PIN codes, using security apps, disabling NFC when not in use, utilizing protective cases, and opting for virtual cards with authentication.

As cyber threats continue to evolve, it is crucial for users to stay informed and take necessary precautions to safeguard their personal information. The rise of NGate malware serves as a reminder of the ever-present dangers lurking in the digital realm and the importance of staying vigilant in today’s interconnected world.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *