A sophisticated tool such as this enables threat actors to make unauthorised contactless payments, allowing them to withdraw money without requiring direct physical access to their cards.
Using such methods, the attacker deceives users into installing a malicious Android application, during which their payment cards are tapped against their compromised devices.
It appears that the platform has been part of a Malware-as-a-Service MaasS) ecosystem for Chinese-speaking users. In addition, it appears to have a significant amount of code overlap with NGate, a malicious NFC toolkit that was previously documented by ESET in 2024. The campaign has had a wide-reaching impact on not only banking customers but also credit card issuers and payme
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: