Article Details
Scrape Timestamp (UTC): 2025-10-30 20:19:54.129
Original Article Text
Click to Toggle View
Massive surge of NFC relay malware steals Europeans’ credit cards. Near-Field Communication (NFC) relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal people's payment card information in the past few months. Contrary to the traditional banking trojans that use overlays to steal banking credentials or remote access tools to perform fraudulent transactions, NFC malware abuses Android's Host Card Emulation (HCE) to emulate or steal contactless credit card and payment data. They capture EMV fields, respond to APDU commands from a POS terminal with attacker-controlled replies, or forward terminal requests to a remote server, which crafts the proper APDU responses to enable payments at the terminal without the physical cardholder present. The technique was spotted in the wild for the first time in 2023 in Poland, followed by campaigns in the Czech Republic, and later, more massive attack waves in Russia. Over time, multiple variants emerged following different practical approaches, including: According to mobile security firm Zimperium, a member of Google's 'App Defense Alliance,' the popularity of NFC malware on Android has exploded lately, particularly in Eastern Europe. "What began as just a few isolated samples has now expanded to more than 760 malicious apps observed in the wild—demonstrating that NFC relay abuse is not slowing down but continuing to accelerate," explains Zimperium. "Campaigns previously documented by other vendors are now broadening their reach to additional regions, including Russia, Poland, the Czech Republic, Slovakia, and others." The firm has identified over 70 command-and-control (C2) servers and app distribution hubs supporting these campaigns, as well as dozens of Telegram bots and private channels used to exfiltrate stolen data or coordinate operations. The apps used to distribute the malware impersonate Google Pay or financial institutions such as Santander Bank, VTB Bank, Tinkoff Bank, ING Bank, Bradesco Bank, Promsvyazbank (PSB), and several others. Android users are advised to never install APKs from outside Google Play unless they explicitly trust the publisher, only install banking apps from the official bank links, and check for suspicious permissions, such as NFC access or foreground service privileges. Additionally, it is recommended to regularly scan your device with Play Protect, Android's built-in anti-malware tool, and to disable NFC if not needed. The complete list of the APKs Zimperium discovered in the wild is available here. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Researchers identified over 760 malicious Android apps using NFC relay techniques to steal payment card information across Eastern Europe, with significant activity noted in Poland, Czech Republic, and Russia.
This malware exploits Android's Host Card Emulation (HCE) to emulate or capture contactless credit card data, enabling unauthorized transactions without the physical cardholder's presence.
Zimperium, a mobile security firm, reported the malware's rapid expansion, supported by over 70 command-and-control servers and distribution hubs, as well as Telegram channels for data exfiltration.
The malware often disguises itself as legitimate apps, such as Google Pay or various financial institutions, increasing the risk of unsuspecting users downloading harmful software.
Android users are advised to only download apps from trusted sources, regularly use Play Protect for scanning, and disable NFC when not in use to mitigate risks.
The ongoing proliferation of NFC relay malware signals a growing threat landscape, necessitating heightened vigilance and robust security measures for mobile users in affected regions.