Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft

NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft

Posted on April 21, 2026 By CWS

Cybersecurity experts have identified a new version of the NGate malware, which has been adapted to exploit the HandyPay application, a legitimate tool for NFC data transfer. This malicious activity has been primarily targeting users in Brazil. According to ESET security researcher Lukáš Štefanko, the attackers modified HandyPay with AI-generated harmful code to intercept NFC data from victims’ payment cards.

How NGate Targets NFC Data

The NGate malware, also referred to as NFSkate, was initially documented by Slovakian cybersecurity firm ESET in August 2024. Known for its ability to execute NFC relay attacks, NGate aims to extract contactless payment data, enabling the perpetrators to execute unauthorized transactions. In its latest iteration, the malware has been distributed through websites that imitate the Rio de Prêmios lottery, tricking users into downloading the compromised HandyPay app.

Once installed, the app prompts users to set it as their default payment application. Subsequently, the user is deceived into entering their card PIN and tapping their card on an NFC-enabled device. This process allows the malware to capture and transmit NFC data to a device controlled by the attackers, facilitating the misuse of the stolen information for ATM withdrawals.

Distribution Tactics and Campaign Origins

The ongoing campaign is believed to have started around November 2025. The altered HandyPay app has never been available on the Google Play Store, indicating that attackers rely on deceptive methods to circulate the app. HandyPay has initiated an internal probe to address these security breaches.

Researchers have noted that the lower subscription costs associated with HandyPay might have influenced the attackers’ decision to switch from other costly solutions. The app’s minimal permission requirements further aid in keeping the operation under the radar, as it only needs to be set as the default payment app.

AI’s Role in Malware Development

Analysis of the infected app indicates the use of emojis in debug and toast messages, suggesting the involvement of large language models in the code generation or modification process. Although definitive evidence is lacking, this aligns with a growing trend of cybercriminals leveraging generative AI to create malware with limited technical know-how.

ESET’s findings underscore a concerning rise in NFC-related fraud as cybercriminals continuously adapt their strategies. The decision to exploit HandyPay rather than established NFC solutions reflects an ongoing evolution in attack methodologies, signaling the need for enhanced vigilance among users and cybersecurity professionals alike.

The Hacker News Tags:AI-generated code, Brazil, contactless payment fraud, Cybercrime, Cybersecurity, ESET, HandyPay, Malware, mobile security, NFC data theft, NFC relay attacks, NGate, smartphone security, Trojanized apps

Post navigation

Previous Post: Hackers Exploit FortiGate VPN with Nightmare-Eclipse Tools
Next Post: Security Flaws in Perforce Servers Risk Sensitive Data

Related Posts

ZeroDayRAT Spyware Threatens Android and iOS Security ZeroDayRAT Spyware Threatens Android and iOS Security The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
The CTEM Conversation We All Need The CTEM Conversation We All Need The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat The Hacker News
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark