Thursday, April 17, 2025
HomeAppleHackers Conceal NFC Carders Behind Apple Pay and Google Wallet

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

Published on

SIEM as a Service

Follow Us on Google News

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile payment systems such as Apple Pay and Google Wallet.

Once reliant on magnetic stripe card cloning, fraudsters have adapted to breakthroughs in card security technology like chip cards and one-time passwords, exploiting vulnerabilities in contactless payments and digital wallets.

By phishing sensitive payment data and linking stolen card details to their own mobile wallets, hackers have turned smartphones into sophisticated tools for laundering funds obtained through digital scams.

- Advertisement - Google News

Industrial-Scale Phishing and Card Linking

The scam begins with meticulously crafted phishing techniques. Cybercriminals set up networks of fake websites resembling trusted platforms like delivery services, online stores, or government payment portals.

Victims are lured into entering card credentials and authorizing transactions via one-time passwords (OTPs).

Unbeknownst to them, the credentials are instantaneously transferred to attackers who link the stolen details to a mobile wallet such as Apple Pay or Google Wallet.

Sophisticated software replicates the card details for seamless integration into the wallet, enabling scammers to make contactless payments in stores or at ATMs.

To streamline operations, fraudsters often purchase numerous smartphones preloaded with payment apps and digital wallets.

Software tools accelerate the card-linking process, generating perfect replicas of the stolen cards.

Even incomplete form entries on phishing sites are siphoned for additional data, allowing cybercriminals to phish multiple cards from a single victim.

Advanced NFC Relay Techniques and Dark Web Sales

Once linked, stolen cards are stored in mobile wallets that are resold on the dark web to minimize direct exposure.

Weeks or months may pass before criminals monetize the stolen credentials, using NFC-enabled smartphones for direct payments at luxury retail outlets or withdrawals at ATMs.

A more sophisticated technique, known as “Ghost Tap,” involves NFC relay systems.

Using legitimate apps like NFCGate, attackers transmit wallet data from one smartphone to another in real-time, enabling accomplices (“mules”) to perform transactions at payment terminals without direct connection to the original stolen card data.

This layered approach ensures that any incriminating evidence remains with a mastermind operating remotely, while mules perform payment tasks that appear legitimate.

Goods purchased or cash withdrawn are often untraceable, facilitating the laundering of stolen funds.

A newer variant of this scheme emerged in late 2024, particularly targeting users in Russia and rapidly scaling globally.

Instead of phishing card credentials directly, hackers socially engineer victims into installing malicious apps disguised as government, banking, or utility tools.

According to the Report, these apps prompt users to hold their NFC-enabled card to their smartphone for “verification,” capturing and transmitting card data and PINs to attackers.

Fraudsters then remotely authorize ATM transactions or utilize the card data for unauthorized payments.

In another deceptive tactic, victims are persuaded to deposit funds into “safe accounts” via ATMs under the pretense of theft risk.

By deploying NFC relay apps during these transactions, attackers redirect funds to their own accounts while masking the fraud as legitimate ATM activity.

As these sophisticated attacks evolve, technology providers like Apple and Google, alongside financial institutions, must implement stringent security protocols to safeguard mobile payment systems.

Biometric authentication and location-based transaction verification may offer additional layers of protection to counter such fraud.

Users, too, can take preventive measures to minimize risks:

  • Use virtual cards for online payments and offline alternatives for contactless purchases.
  • Verify the authenticity of apps before installation, avoiding software from untrusted sources.
  • Install reliable security solutions on devices to detect phishing attempts and malicious activities.
  • Enable instant transaction notifications to identify suspicious activity promptly.

The rise in fraud involving mobile wallets highlights the need for vigilance in adopting emerging financial technologies.

While these systems offer undeniable convenience, the increase in cyber risks requires robust security measures to preserve trust and safeguard consumer assets.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...