Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New NFC-Driven PhantomCard Android Malware Attacking Banking Users

Posted on August 15, 2025August 15, 2025 By CWS

A complicated new Android malware dubbed PhantomCard has emerged from the shadows of Brazil’s cybercriminal underground, representing a big evolution in cell banking threats.

This malicious software leverages Close to Subject Communication (NFC) expertise to create a seamless bridge between victims’ bodily banking playing cards and fraudsters’ units, enabling real-time monetary theft with out the necessity for bodily card possession.

The malware masquerades as a official “Proteção Cartões” (Card Safety) software, distributed by means of convincing faux Google Play Retailer pages that promise enhanced safety for customers’ banking playing cards.

PhantomCard operates by means of an ingenious relay mechanism that transforms contaminated smartphones into distant card skimmers.

When victims are prompted to faucet their banking playing cards towards their telephone to provoke what they imagine is a safety verification course of, the malware silently captures and transmits the NFC knowledge to cybercriminals’ units through encrypted channels.

Pretend web page distribution (Supply – Menace Cloth)

This permits fraudsters to conduct transactions at Level-of-Sale terminals or ATMs as in the event that they bodily possessed the sufferer’s card, full with PIN authentication that the malware individually harvests by means of a convincing interface.

Menace Cloth analysts recognized that PhantomCard shouldn’t be an authentic creation however slightly a personalized model of the Chinese language-originated “NFU Pay” Malware-as-a-Service platform.

The invention reveals a regarding pattern the place worldwide cybercriminal instruments are being localized and redistributed by regional risk actors, particularly concentrating on Brazilian banking prospects whereas sustaining world enlargement capabilities.

The malware’s Command-and-Management server consists of endpoints particularly coded for Brazilian operations, with “/baxi/b” referencing “Brazil” in Chinese language (巴西, Bāxī).

The technical implementation of PhantomCard demonstrates refined understanding of EMV cost protocols. The malware particularly targets ISO-DEP (ISO 14443-4) normal contactless playing cards, using the “scuba_smartcards” library for knowledge parsing.

On the left – ‘sufferer’ tapping the cardboard towards the system contaminated with PhantomCard (Supply – Menace Cloth)

Upon detecting an NFC tag, PhantomCard establishes an ISO-DEP connection and sends a vital APDU command: 00A404000E325041592E5359532E444446303100, which selects the Cost System Atmosphere listing.

This command particularly targets EMV playing cards by accessing the “2PAY.SYS.DDF01” listing utilized in trendy cost methods.

Superior NFC Relay Structure

PhantomCard’s relay mechanism operates by means of a classy two-phase course of that seamlessly bridges bodily playing cards with distant terminals.

The malware first establishes connection parameters with in depth logging capabilities, as evidenced within the code snippet displaying Chinese language debug messages: “正在建立ISO-DEP连接…” (Establishing ISO-DEP connection).

The appliance units communication timeouts to 120,000 milliseconds, guaranteeing secure knowledge transmission even in difficult community situations.

When cybercriminals provoke fraudulent transactions, PhantomCard receives WebSocket messages containing transaction directions.

The malware parses these instructions and identifies transaction knowledge by means of sample matching, particularly detecting “80A” instruction codes that point out cost authorization requests.

Vital transaction components together with quantity and forex codes are extracted from particular byte positions inside the APDU instructions, enabling exact transaction replication at distant places.

This refined relay system represents a harmful evolution in cell banking threats, combining social engineering with superior NFC manipulation to create just about undetectable fraud situations that conventional banking safety methods wrestle to determine.

Enhance your SOC and assist your staff defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Android, Attacking, Banking, Malware, NFCDriven, PhantomCard, Users

Post navigation

Previous Post: Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection
Next Post: New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Related Posts

glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
Microsoft Investigating Forms Service Issue Not Accessible for Users Cyber Security News
New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk
  • U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
  • New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash
  • Privacy in the Age of Agentic AI
  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk
  • U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
  • New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash
  • Privacy in the Age of Agentic AI
  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News