Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data

Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data

Posted on January 7, 2026January 7, 2026 By CWS

Chinese language risk actors have launched a classy marketing campaign utilizing NFC-enabled Android malware referred to as Ghost Faucet to intercept and steal monetary data from victims worldwide.

The malware operates by means of a misleading distribution mannequin, the place attackers trick customers into downloading seemingly legit functions through Telegram and different messaging platforms.

As soon as put in, Ghost Faucet leverages Close to Subject Communication know-how to learn cost card information when victims unknowingly faucet their playing cards in opposition to contaminated units, silently capturing delicate data with out person consciousness.

The assault chain depends closely on social engineering techniques to maximise an infection charges. Attackers craft convincing lures disguised as common functions, gaming software program, or utility instruments to decrease customers’ guard and encourage downloads.

The malware then requests permission to entry NFC performance, which most customers grant with out understanding the safety implications.

As soon as activated, Ghost Faucet operates within the background, repeatedly monitoring for NFC card interactions and transmitting stolen information by means of distant servers managed by the risk actors.

Group-IB Menace Intelligence researchers recognized the marketing campaign after monitoring over 54 distinctive Ghost Faucet samples circulating throughout a number of distribution channels.

Chinese language risk actors are deploying NFC-enabled #Androidmalware generally known as “Ghost Faucet” to remotely relay cost information from victims’ playing cards through Telegram-distributed apps. Utilizing #socialengineering, victims are tricked into putting in APKs and tapping their playing cards, enabling fraudsters… pic.twitter.com/W1HjkB5jMg— Group-IB Menace Intelligence (@GroupIB_TI) January 7, 2026

The researchers famous that many variants impersonate legit functions from well-known firms, making detection tougher for common customers.

Their evaluation revealed that fraudsters use the intercepted cost information to conduct unauthorized transactions by means of illicit point-of-sale terminals, with victims reporting monetary losses throughout a number of international locations.

Persistence mechanism

The malware’s persistence mechanism represents a very regarding technical facet of this risk. Ghost Faucet employs superior evasion strategies to keep up its presence on contaminated units even after customers try and uninstall functions.

The malware registers itself as a system service and hooks into Android’s NFC framework at a deep stage, permitting it to function independently from the father or mother utility.

Work movement (Supply – X)

When a person makes an attempt deletion, Ghost Faucet mechanically reinstalls itself by leveraging compromised system processes, making removing extraordinarily tough with out technical experience or specialised safety instruments.

Safety researchers advocate customers train excessive warning when putting in functions from untrusted sources and confirm app authenticity by means of official utility shops solely.

Disabling NFC performance when not in use gives further safety in opposition to these assaults.

Organizations ought to implement cell system administration options to observe and block suspicious functions, whereas customers should stay vigilant about granting permissions to put in software program.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Chinese, Data, Deploy, Hackers, Malware, NFCenabled, Payment, Steal

Post navigation

Previous Post: Cybersecurity Firms Secured $14 Billion in Funding in 2025: Analysis
Next Post: Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs

Related Posts

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities Cyber Security News
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News
Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News