#PhantomCard

2026-01-15

According to ESET telemetry, threat actors keep finding new ways to exploit #NFC technology: detections surged by 78% compared to H1 2025; however, overall numbers remain low.
#NGate has demonstrated its relevance and is now enhanced with contact-stealing functionality. ESET researchers believe that this feature is designed to lay the groundwork for future attacks.
An NGate-based malware adapted for Brazil, #PhantomCard, targets banking clients via fake #Android apps that claim to improve security and privacy, distributed on pages featuring fabricated positive reviews.
And #RatOn combines RAT-like features with relay functionality, showcasing the determination of threat actors to evolve the methods of compromise. It’s distributed via fraudulent ads and apps, with the language targeting Czech and Slovak users.
Attackers remain faithful to tried-and-tested methods like #phishing calls and messages, while increasingly relying on psychological manipulation and #social engineering rather than exploiting just the technological aspect of NFC.
Read more about the evolution of NFC threat landscape in the latest #ESETThreatReport web-assets.esetstatic.com/wls/

2025-11-06

ESETresearch identified an active campaign distributing #NGate – Android NFC relay malware used for contactless payment fraud – targeting Brazilian users.
It is available for download via fake Google Play sites mimicking 4 major banks and 1 e-commerce app.
It shares the same package name (com.billy.cardemv) as some #NGate / #PhantomCard variants targeting Brazil, suggesting it could be a new version still focused on Brazil.
#ngate captures NFC card data and relays it to an attacker-controlled device, which uses the data for ATM withdrawals or POS payments—all without physical access to the victim’s card. We described #NGate in details in our blogpost in 2024
welivesecurity.com/en/eset-res
IoCs:
Android/Spy.NGate.BD
223D7AA925549C9C657C017F06CF7C19595C2CEE
5a341dc1-98f9-4264-859a-e8bc6d236024-00-1vfeomyys26m9.janeway.replit[.]dev
googleplay-santander.pages[.]dev
googleplay-bb.pages[.]dev
googleplay-itau.pages[.]dev
googleplay-mercadolivre.pages[.]dev
googleplay-bradesco.pages[.]dev

Rundkuchenbrot / PseudoRundkuchenbrot@troet.cafe
2025-08-19

#PhantomCard
#Android -Nutzer, die kontaktlos bezahlen
greift gezielt Kredit- und Bankkarten an
über manipulierte Webseiten verbreitet, - Google Play Store
- bieten vermeintliche Sicherheits-Apps an
- fordert PhantomCard die Nutzer auf, ihre Kredit- oder Debitkarte an die Rückseite des Smartphones zu halten
- Kartendaten direkt an Server der Angreifer übermittelt
- Eingabe der PIN verlangt
- gestohlenen Karten an #NFC -fähigen Terminals oder Geldautomaten nutzen

focus.de/digital/gefaehrlicher

TechNewsRoonetechnews
2025-08-15
phantomcard

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst