Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DevilNFC Malware Traps Victims in Fake Banking Screens

DevilNFC Malware Traps Victims in Fake Banking Screens

Posted on May 20, 2026 By CWS

A novel threat known as DevilNFC has surfaced in the Android ecosystem, employing a sophisticated combination of NFC relay attacks and Kiosk Mode exploitation. This malware effectively entraps users in a counterfeit banking interface, leading to unauthorized card data theft.

The Emergence of DevilNFC

DevilNFC specifically targets individuals in Europe and Latin America, showcasing an unprecedented level of technical skill for an independently developed threat. The malware is distinct in that it does not rely on existing code or shared infrastructure, indicating it was developed by a unique group of cybercriminals.

The attack is initiated via deceptive messages sent through SMS or WhatsApp, which lure victims to a fraudulent webpage mimicking the Google Play Store. This page falsely advertises a necessary security update from a recognized banking entity. Upon installation, the malware takes control, leaving users unaware of their compromised systems.

Advanced NFC Relay Techniques

Research conducted by Cleafy’s Threat Intelligence team has revealed that DevilNFC is more sophisticated than its counterpart, NFCMultiPay, with both being new additions to the NFC relay malware families. Despite the absence of shared code, both malware types are actively exploiting banking customers, marking a shift in the threat landscape.

DevilNFC isolates victims by leveraging Android’s Kiosk Mode to suppress the system UI and disable hardware controls. This lock-in strategy is part of a broader, AI-assisted development trend noticed in both malware families, featuring advanced phishing templates and other generative AI characteristics.

Operational Tactics and Implications

In practice, once the malware is activated, it uses Kiosk Mode to obscure the device’s UI, creating a seamless trap for the victim. A fake verification prompt encourages users to input their card PIN, which is then transmitted to the attackers both through a command and control server and a private Telegram channel.

The DevilNFC employs a Dual-Role APK architecture, enabling it to function as both a passive NFC reader and a card emulator, allowing for the execution of unauthorized transactions globally. Researchers emphasize the importance of downloading apps only from verified sources and being cautious of unexpected PIN requests.

Both malware families demonstrate signs of AI-driven development, as observed by ESET Research, further complicating the security landscape. This trend towards self-reliant tool creation in regional cybercriminal groups underscores the need for heightened vigilance and proactive cybersecurity measures.

Cyber Security News Tags:AI-assisted malware, Android malware, banking security, Cleafy, Cybersecurity, DevilNFC, Kiosk Mode, NFC relay attacks, Phishing, Threat Landscape

Post navigation

Previous Post: Anthropic Addresses Claude Code Sandbox Flaw Quietly
Next Post: Join Today’s Virtual Summit on Cyber Threat Response

Related Posts

70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit Cyber Security News
Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data Cyber Security News
An Open-Source Tool to See Through Encrypted Traffic in Linux systems An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer Cyber Security News
Palo Alto Networks Finalizes B CyberArk Acquisition Palo Alto Networks Finalizes $25B CyberArk Acquisition Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Android Ad Fraud Uncovered with 455 Apps
  • Critical FreePBX Flaw Exposes User Portals
  • PinTheft Exploit Highlights Critical Linux Vulnerability
  • Join Today’s Virtual Summit on Cyber Threat Response
  • DevilNFC Malware Traps Victims in Fake Banking Screens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Android Ad Fraud Uncovered with 455 Apps
  • Critical FreePBX Flaw Exposes User Portals
  • PinTheft Exploit Highlights Critical Linux Vulnerability
  • Join Today’s Virtual Summit on Cyber Threat Response
  • DevilNFC Malware Traps Victims in Fake Banking Screens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark