Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New NFC-Driven PhantomCard Android Malware Attacking Banking Users

Posted on August 15, 2025August 15, 2025 By CWS

A complicated new Android malware dubbed PhantomCard has emerged from the shadows of Brazil’s cybercriminal underground, representing a big evolution in cell banking threats.

This malicious software leverages Close to Subject Communication (NFC) expertise to create a seamless bridge between victims’ bodily banking playing cards and fraudsters’ units, enabling real-time monetary theft with out the necessity for bodily card possession.

The malware masquerades as a official “Proteção Cartões” (Card Safety) software, distributed by means of convincing faux Google Play Retailer pages that promise enhanced safety for customers’ banking playing cards.

PhantomCard operates by means of an ingenious relay mechanism that transforms contaminated smartphones into distant card skimmers.

When victims are prompted to faucet their banking playing cards towards their telephone to provoke what they imagine is a safety verification course of, the malware silently captures and transmits the NFC knowledge to cybercriminals’ units through encrypted channels.

Pretend web page distribution (Supply – Menace Cloth)

This permits fraudsters to conduct transactions at Level-of-Sale terminals or ATMs as in the event that they bodily possessed the sufferer’s card, full with PIN authentication that the malware individually harvests by means of a convincing interface.

Menace Cloth analysts recognized that PhantomCard shouldn’t be an authentic creation however slightly a personalized model of the Chinese language-originated “NFU Pay” Malware-as-a-Service platform.

The invention reveals a regarding pattern the place worldwide cybercriminal instruments are being localized and redistributed by regional risk actors, particularly concentrating on Brazilian banking prospects whereas sustaining world enlargement capabilities.

The malware’s Command-and-Management server consists of endpoints particularly coded for Brazilian operations, with “/baxi/b” referencing “Brazil” in Chinese language (巴西, Bāxī).

The technical implementation of PhantomCard demonstrates refined understanding of EMV cost protocols. The malware particularly targets ISO-DEP (ISO 14443-4) normal contactless playing cards, using the “scuba_smartcards” library for knowledge parsing.

On the left – ‘sufferer’ tapping the cardboard towards the system contaminated with PhantomCard (Supply – Menace Cloth)

Upon detecting an NFC tag, PhantomCard establishes an ISO-DEP connection and sends a vital APDU command: 00A404000E325041592E5359532E444446303100, which selects the Cost System Atmosphere listing.

This command particularly targets EMV playing cards by accessing the “2PAY.SYS.DDF01” listing utilized in trendy cost methods.

Superior NFC Relay Structure

PhantomCard’s relay mechanism operates by means of a classy two-phase course of that seamlessly bridges bodily playing cards with distant terminals.

The malware first establishes connection parameters with in depth logging capabilities, as evidenced within the code snippet displaying Chinese language debug messages: “正在建立ISO-DEP连接…” (Establishing ISO-DEP connection).

The appliance units communication timeouts to 120,000 milliseconds, guaranteeing secure knowledge transmission even in difficult community situations.

When cybercriminals provoke fraudulent transactions, PhantomCard receives WebSocket messages containing transaction directions.

The malware parses these instructions and identifies transaction knowledge by means of sample matching, particularly detecting “80A” instruction codes that point out cost authorization requests.

Vital transaction components together with quantity and forex codes are extracted from particular byte positions inside the APDU instructions, enabling exact transaction replication at distant places.

This refined relay system represents a harmful evolution in cell banking threats, combining social engineering with superior NFC manipulation to create just about undetectable fraud situations that conventional banking safety methods wrestle to determine.

Enhance your SOC and assist your staff defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Android, Attacking, Banking, Malware, NFCDriven, PhantomCard, Users

Post navigation

Previous Post: Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection
Next Post: New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Related Posts

Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange Cyber Security News
EY’s 4TB SQL Server Backup File On Microsoft Azure Exposed Publically Cyber Security News
Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Cyber Security News
Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News
Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, Windows 10 Versions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark