Emerging Ghost-Tapping Attacks Compromise Mobile Wallets Linked to Apple Pay and Google Pay

A sophisticated cybercriminal technique known as ghost-tapping has recently surfaced, posing a significant threat to contactless payment systems. This method enables threat actors, particularly those fluent in Chinese, to exploit stolen payment card information linked to mobile wallet services such as Apple Pay and Google Pay. By leveraging Near Field Communication (NFC) relay tactics, these cybercriminals can convert digital theft into tangible goods through an intricate network of mules and automated systems.

Understanding Ghost-Tapping

Ghost-tapping represents a convergence of traditional phishing methods with advanced NFC relay technology, resulting in a comprehensive fraud operation that spans multiple countries and involves various criminal roles. Unlike conventional card fraud, which typically relies on online transactions, ghost-tapping allows criminals to make in-person purchases at retail stores. This approach complicates detection efforts for traditional fraud monitoring systems, as it effectively bypasses the need for physical proximity to the original card.

The Scale of the Threat

Recent data from Singaporean authorities highlight the magnitude of this emerging threat. Between October and December 2024, there were 656 reported cases of compromised payment cards involving mobile wallets, leading to losses exceeding $1.2 million SGD. Notably, at least 502 of these incidents involved cards linked to Apple Pay, underscoring the particular vulnerability of popular mobile payment platforms to this attack method.

Technical Infrastructure and Attack Methodology

The ghost-tapping attack chain begins with cybercriminals employing automated systems to harvest payment card credentials through phishing campaigns and mobile malware. Once obtained, these stolen credentials are systematically added to contactless payment wallets on burner phones using proprietary software designed to bypass traditional authentication measures.

The process involves sophisticated automation capabilities. For instance, there have been observed attempts to add compromised DBS Bank cards to Apple Pay at precise intervals of four to eight minutes, demonstrating the industrial scale of these operations.

NFC Relay Tools and Real-Time Transactions

The technical foundation of ghost-tapping relies on NFC relay tools such as NFCGate, an Android application originally developed for legitimate NFC traffic analysis but repurposed for criminal activities. The attack requires two mobile devices with NFCGate installed and a server configured to relay traffic between locations.

In practice, when a money mule approaches a point-of-sale terminal, the system can relay tokenized card data in real-time from the attacker’s infrastructure to the mule’s device. This setup enables unauthorized transactions without the physical presence of the original card, effectively bypassing physical proximity requirements.

The Criminal Ecosystem

The criminal ecosystem supporting ghost-tapping operations extends beyond simple card theft to encompass a sophisticated supply chain involving multiple specialized roles. Cybercriminals, such as those operating under the alias @webu8 on Telegram platforms, function as suppliers. They provide not only burner phones loaded with stolen credentials but also offer phone recycling services to maximize operational efficiency.

These threat actors sell devices for approximately $500 USDT when loaded with ten compromised payment cards, establishing a clear economic model that incentivizes large-scale operations.

Challenges for Payment Card Authentication Systems

Payment card authentication systems face particular challenges when confronting ghost-tapping attacks, as the technique exploits legitimate NFC communication protocols. The automation observed in these attacks suggests that criminals have developed sophisticated methods to overcome security features implemented by banks, including multi-factor authentication and time-limited approval windows.

Even security measures such as requiring mobile app authentication can be circumvented when criminals have gained access to victims’ banking credentials through comprehensive phishing campaigns or mobile malware infections.

Global Reach and Law Enforcement Challenges

The geographical distribution of ghost-tapping operations reflects the global nature of modern cybercrime. Criminal syndicates based in Cambodia and China orchestrate attacks that target victims worldwide while deploying mules to conduct fraudulent purchases in countries with robust retail infrastructure.

This international scope complicates law enforcement efforts and enables criminals to exploit jurisdictional gaps in cybercrime prosecution, making ghost-tapping a particularly resilient threat to the global payment ecosystem.

Mitigation Strategies

To combat the threat posed by ghost-tapping attacks, financial institutions and consumers can adopt several mitigation strategies:

1. Enhanced Authentication Measures: Banks should implement stronger authentication protocols for adding cards to mobile wallets. This could include multi-factor authentication methods that are less susceptible to phishing attacks.

2. Behavioral Analytics: Financial institutions can employ behavioral analytics to detect anomalies in transaction patterns, such as purchases made in geographically disparate locations within short time frames.

3. Consumer Education: Educating consumers about the risks of phishing and the importance of safeguarding their banking credentials can reduce the likelihood of credential theft.

4. Collaboration and Information Sharing: Financial institutions, payment service providers, and law enforcement agencies should collaborate and share information about emerging threats to develop more effective countermeasures.

Conclusion

The emergence of ghost-tapping attacks underscores the evolving nature of cyber threats targeting the financial sector. By exploiting vulnerabilities in contactless payment systems and leveraging sophisticated technologies, cybercriminals have developed a method that challenges traditional fraud detection mechanisms. Addressing this threat requires a multifaceted approach, combining technological solutions, consumer education, and international cooperation to safeguard the integrity of mobile payment platforms.