Over 700 Malicious Android Apps Exploit NFC to Steal Banking Credentials, Affecting Users Globally

Over 700 Malicious Android Apps Exploit NFC to Steal Banking Credentials

A sophisticated malware campaign leveraging Near Field Communication (NFC) technology on Android devices has significantly expanded since its initial detection in April 2024. Initially observed as isolated incidents, this threat has now escalated, with over 760 malicious applications identified in circulation. These apps exploit NFC and Host Card Emulation (HCE) capabilities to illicitly capture payment data and facilitate unauthorized transactions.

Global Impact and Expansion

The campaign’s reach has extended beyond its original targets, now affecting users in countries including Russia, Poland, the Czech Republic, Slovakia, and Brazil. This widespread distribution underscores the evolving nature of cyber threats and the necessity for heightened vigilance among Android users worldwide.

Deceptive Tactics and User Manipulation

The malware operates by masquerading as legitimate applications from financial institutions, deceiving users into installing apps that appear to represent trusted banks and government agencies. Once installed, these applications prompt victims to set them as the default NFC payment method on their devices. This manipulation allows the malware to intercept payment card data during tap-to-pay transactions, exfiltrating sensitive information such as card numbers, expiration dates, and EMV fields to threat actors via private Telegram channels.

Infrastructure and Command Mechanisms

Analysts have uncovered an extensive infrastructure supporting these operations, including over 70 command-and-control servers, numerous Telegram bots for coordination, and approximately 20 impersonated institutions. Targeted entities encompass major Russian banks like VTB, Tinkoff, and Promsvyazbank, as well as international institutions such as Santander, Bradesco, PKO Bank Polski, and government portals including Russia’s Gosuslugi service.

The malicious applications establish persistent connections with command-and-control servers through WebSocket communications, enabling real-time bidirectional exchanges. The apps execute commands such as `register_device`, which transmits hardware identifiers, device models, NFC support status, and IP addresses to the server. The `apdu_command` instruction forwards payment terminal requests to the C2 infrastructure, while `apdu_response` returns crafted replies that manipulate transaction flows. Additional commands like `card_info` and `get_pin` facilitate the extraction of complete payment credentials, with threat actors receiving automated notifications containing full card details through Telegram integrations via the `telegram_notification` command.

Technical Exploitation of NFC Technology

The malware’s exploitation of NFC technology is particularly concerning due to the widespread adoption of contactless payments. By abusing NFC and HCE capabilities, these malicious apps can emulate legitimate payment cards, allowing attackers to perform unauthorized transactions without physical access to the victim’s card. This method represents a significant evolution in cybercriminal tactics, moving beyond traditional credential theft to direct financial exploitation through advanced technological means.

Recommendations for Users

To mitigate the risk posed by these malicious applications, users are advised to:

– Download Apps from Trusted Sources: Only install applications from official app stores and verify the developer’s credibility.

– Review App Permissions: Be cautious of apps requesting excessive permissions, especially those related to NFC and payment processing.

– Keep Software Updated: Regularly update your device’s operating system and applications to benefit from the latest security patches.

– Monitor Financial Statements: Regularly review bank statements for unauthorized transactions and report any suspicious activity immediately.

– Use Security Solutions: Employ reputable mobile security software to detect and prevent malware infections.

Conclusion

The rapid proliferation of over 700 malicious Android applications exploiting NFC technology highlights the evolving landscape of cyber threats targeting mobile payment systems. As cybercriminals continue to develop more sophisticated methods to exploit technological vulnerabilities, it is imperative for users to remain vigilant, adopt proactive security measures, and stay informed about emerging threats to safeguard their financial information.