Thursday, April 10, 2025
HomeCyber Security NewsHackers Converting Stolen Payment Card Data into Apple & Google Wallets

Hackers Converting Stolen Payment Card Data into Apple & Google Wallets

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts.

This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.

Sophisticated Phishing Tactics

Chinese cybercrime groups employ phishing kits that bypass traditional SMS networks by utilizing Apple iMessage and Google’s RCS technologies.

- Advertisement - Google News

Victims are lured through messages impersonating entities like the U.S. Postal Service or toll road operators, requesting payment for fabricated fees.

Once victims input their payment card details, they are prompted to provide a one-time passcode (OTP), ostensibly for verification.

In reality, this OTP is used by the attackers to link the victim’s card to a mobile wallet on a device they control.

The phishing kits are highly advanced, capturing data even if users abandon the process mid-way.

Additionally, these kits forward stolen data to secure back-end databases, ensuring its safety even if phishing sites are taken down.

Criminals also use automated systems to create fake Apple and Google accounts, enabling mass distribution of phishing messages.

Ghost Tap Technology

Once linked to a stolen card, digital wallets are loaded onto smartphones controlled by the scammers.

These devices, often containing multiple wallets from different financial institutions, are sold in bulk for significant profits.

Some groups expedite fraudulent activity by setting up fake e-commerce businesses on platforms like Stripe or Zelle to cash out funds.

A more sophisticated method involves “Ghost Tap” technology, which uses an Android app called ZNFC to relay Near Field Communication (NFC) transactions globally.

With this tool, scammers can execute tap-to-pay transactions remotely from anywhere in the world. The app is sold for $500 per month and includes 24/7 support.

Research indicates that these operations have caused an estimated $15 billion in fraudulent charges annually.

Security experts have observed nearly 33,000 domains tied to these phishing schemes, with losses averaging $250 per compromised card.

The financial sector has struggled to counter these attacks due to their reliance on OTPs sent via SMS for mobile wallet authentication a vulnerability exploited by phishers.

Some European and Asian banks now require customers to authenticate through their banking apps before linking wallets.

However, broader solutions may involve updating payment terminals to detect relayed NFC transactions and enhancing account monitoring by tech giants like Apple and Google.

Despite these challenges, experts emphasize that stronger collaboration between financial institutions and technology providers is essential to curb this growing threat.

Neither Apple nor Google has commented on their role in addressing these vulnerabilities.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...

CatB Ransomware Abuses Microsoft Distributed Transaction Coordinator for Stealthy Payload Execution

The cybersecurity realm has encountered a formidable adversary with the emergence of CatB ransomware,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...