Cyber Security News

Hackers Converting Stolen Payment Card Data into Apple & Google Wallets

Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts.

This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.

Sophisticated Phishing Tactics

Chinese cybercrime groups employ phishing kits that bypass traditional SMS networks by utilizing Apple iMessage and Google’s RCS technologies.

Victims are lured through messages impersonating entities like the U.S. Postal Service or toll road operators, requesting payment for fabricated fees.

Once victims input their payment card details, they are prompted to provide a one-time passcode (OTP), ostensibly for verification.

In reality, this OTP is used by the attackers to link the victim’s card to a mobile wallet on a device they control.

The phishing kits are highly advanced, capturing data even if users abandon the process mid-way.

Additionally, these kits forward stolen data to secure back-end databases, ensuring its safety even if phishing sites are taken down.

Criminals also use automated systems to create fake Apple and Google accounts, enabling mass distribution of phishing messages.

Ghost Tap Technology

Once linked to a stolen card, digital wallets are loaded onto smartphones controlled by the scammers.

These devices, often containing multiple wallets from different financial institutions, are sold in bulk for significant profits.

Some groups expedite fraudulent activity by setting up fake e-commerce businesses on platforms like Stripe or Zelle to cash out funds.

A more sophisticated method involves “Ghost Tap” technology, which uses an Android app called ZNFC to relay Near Field Communication (NFC) transactions globally.

With this tool, scammers can execute tap-to-pay transactions remotely from anywhere in the world. The app is sold for $500 per month and includes 24/7 support.

Research indicates that these operations have caused an estimated $15 billion in fraudulent charges annually.

Security experts have observed nearly 33,000 domains tied to these phishing schemes, with losses averaging $250 per compromised card.

The financial sector has struggled to counter these attacks due to their reliance on OTPs sent via SMS for mobile wallet authentication a vulnerability exploited by phishers.

Some European and Asian banks now require customers to authenticate through their banking apps before linking wallets.

However, broader solutions may involve updating payment terminals to detect relayed NFC transactions and enhancing account monitoring by tech giants like Apple and Google.

Despite these challenges, experts emphasize that stronger collaboration between financial institutions and technology providers is essential to curb this growing threat.

Neither Apple nor Google has commented on their role in addressing these vulnerabilities.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago