Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New NFC-Driven PhantomCard Android Malware Attacking Banking Users

Posted on August 15, 2025August 15, 2025 By CWS

A complicated new Android malware dubbed PhantomCard has emerged from the shadows of Brazil’s cybercriminal underground, representing a big evolution in cell banking threats.

This malicious software leverages Close to Subject Communication (NFC) expertise to create a seamless bridge between victims’ bodily banking playing cards and fraudsters’ units, enabling real-time monetary theft with out the necessity for bodily card possession.

The malware masquerades as a official “Proteção Cartões” (Card Safety) software, distributed by means of convincing faux Google Play Retailer pages that promise enhanced safety for customers’ banking playing cards.

PhantomCard operates by means of an ingenious relay mechanism that transforms contaminated smartphones into distant card skimmers.

When victims are prompted to faucet their banking playing cards towards their telephone to provoke what they imagine is a safety verification course of, the malware silently captures and transmits the NFC knowledge to cybercriminals’ units through encrypted channels.

Pretend web page distribution (Supply – Menace Cloth)

This permits fraudsters to conduct transactions at Level-of-Sale terminals or ATMs as in the event that they bodily possessed the sufferer’s card, full with PIN authentication that the malware individually harvests by means of a convincing interface.

Menace Cloth analysts recognized that PhantomCard shouldn’t be an authentic creation however slightly a personalized model of the Chinese language-originated “NFU Pay” Malware-as-a-Service platform.

The invention reveals a regarding pattern the place worldwide cybercriminal instruments are being localized and redistributed by regional risk actors, particularly concentrating on Brazilian banking prospects whereas sustaining world enlargement capabilities.

The malware’s Command-and-Management server consists of endpoints particularly coded for Brazilian operations, with “/baxi/b” referencing “Brazil” in Chinese language (巴西, Bāxī).

The technical implementation of PhantomCard demonstrates refined understanding of EMV cost protocols. The malware particularly targets ISO-DEP (ISO 14443-4) normal contactless playing cards, using the “scuba_smartcards” library for knowledge parsing.

On the left – ‘sufferer’ tapping the cardboard towards the system contaminated with PhantomCard (Supply – Menace Cloth)

Upon detecting an NFC tag, PhantomCard establishes an ISO-DEP connection and sends a vital APDU command: 00A404000E325041592E5359532E444446303100, which selects the Cost System Atmosphere listing.

This command particularly targets EMV playing cards by accessing the “2PAY.SYS.DDF01” listing utilized in trendy cost methods.

Superior NFC Relay Structure

PhantomCard’s relay mechanism operates by means of a classy two-phase course of that seamlessly bridges bodily playing cards with distant terminals.

The malware first establishes connection parameters with in depth logging capabilities, as evidenced within the code snippet displaying Chinese language debug messages: “正在建立ISO-DEP连接…” (Establishing ISO-DEP connection).

The appliance units communication timeouts to 120,000 milliseconds, guaranteeing secure knowledge transmission even in difficult community situations.

When cybercriminals provoke fraudulent transactions, PhantomCard receives WebSocket messages containing transaction directions.

The malware parses these instructions and identifies transaction knowledge by means of sample matching, particularly detecting “80A” instruction codes that point out cost authorization requests.

Vital transaction components together with quantity and forex codes are extracted from particular byte positions inside the APDU instructions, enabling exact transaction replication at distant places.

This refined relay system represents a harmful evolution in cell banking threats, combining social engineering with superior NFC manipulation to create just about undetectable fraud situations that conventional banking safety methods wrestle to determine.

Enhance your SOC and assist your staff defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Android, Attacking, Banking, Malware, NFCDriven, PhantomCard, Users

Post navigation

Previous Post: Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection
Next Post: New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Related Posts

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month Cyber Security News
11 Best SysAdmin Tools – 2025 Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News
Web-to-App Funnels: Pros And Cons Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense
  • Google Says Android pKVM Earns Highest Level of Security Assurance
  • Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products
  • HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap
  • Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense
  • Google Says Android pKVM Earns Highest Level of Security Assurance
  • Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products
  • HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap
  • Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News