Thursday, April 3, 2025
HomeCyber CrimeGhost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or...

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Published on

SIEM as a Service

Follow Us on Google News

Threat actors are exploiting a new cash-out tactic called “Ghost Tap” to siphon funds from stolen credit card details linked to mobile payment services like Google Pay or Apple Pay, which involves relaying NFC traffic, enabling unauthorized transactions without physical access to the victim’s device. 

By understanding this emerging threat, financial institutions can enhance their security measures to protect customer assets and mitigate the risks associated with this sophisticated cash-out technique.

Cybercriminals are leveraging NFCGate to relay NFC traffic between devices, enabling them to cash out funds from stolen cards linked to mobile payment systems like Apple Pay and Google Pay.

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

By exploiting vulnerabilities in these systems, attackers can obtain OTPs and link stolen cards to their devices, which allows them to make payments at offline retailers anonymously and at scale, bypassing traditional security measures and increasing the efficiency of their fraudulent activities.

A post on underground forum

NFCGate is a legitimate research tool used to facilitate large-scale, anonymous cash-outs, where remotely controlling a device with a stolen card linked to a mobile payment system, attackers can direct mules to specific retailers.

The mules, using NFCGate-enabled devices, initiate transactions at the POS terminals. 

The transaction data is relayed to a server, enabling the attacker to monitor and control the process, which allows for widespread, coordinated fraud operations, bypassing traditional geographic and logistical constraints. 

Recent cyberattacks leverage NFC technology, exploiting vulnerabilities in network infrastructure and device security, where malicious software like NFSkate targets mobile devices, while NFCGate-based tools compromise physical cards. 

Relay attacks, enabled by network latency, allow remote transactions using stolen card data.

To mitigate these threats, NFC readers should implement time-based detection mechanisms to identify discrepancies between device location and transaction location. 

When it comes to detecting suspicious activity and preventing unauthorized access, mobile payment services need to also improve their security measures.

scheme of interactions

According to Threat Fabric, cybercriminals exploit the Ghost Tap technique to bypass anti-fraud measures by making multiple small, seemingly legitimate NFC payments, which often involve compromised devices and airplane mode, that can go undetected. 

Financial institutions must proactively monitor for unusual device pairings, rapid, geographically impossible transactions, and suspicious device behavior to identify and prevent such fraudulent activity. 

The detection of potential device compromises at an early stage is absolutely necessary in order to reduce the likelihood of subsequent Ghost Tap attacks.

Cybercriminals can exploit publicly accessible technology to remotely initiate NFC transactions, enabling unauthorized cash-outs, which make it difficult to detect and mitigate. 

Retailers and financial institutions must implement advanced detection models, robust security measures, and industry collaboration to safeguard against these emerging threats and protect customer assets.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised...

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised...

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...