Cyber Security News

Hackers Converting Stolen Payment Card Data into Apple & Google Wallets

Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts.

This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.

Sophisticated Phishing Tactics

Chinese cybercrime groups employ phishing kits that bypass traditional SMS networks by utilizing Apple iMessage and Google’s RCS technologies.

Victims are lured through messages impersonating entities like the U.S. Postal Service or toll road operators, requesting payment for fabricated fees.

Once victims input their payment card details, they are prompted to provide a one-time passcode (OTP), ostensibly for verification.

In reality, this OTP is used by the attackers to link the victim’s card to a mobile wallet on a device they control.

The phishing kits are highly advanced, capturing data even if users abandon the process mid-way.

Additionally, these kits forward stolen data to secure back-end databases, ensuring its safety even if phishing sites are taken down.

Criminals also use automated systems to create fake Apple and Google accounts, enabling mass distribution of phishing messages.

Ghost Tap Technology

Once linked to a stolen card, digital wallets are loaded onto smartphones controlled by the scammers.

These devices, often containing multiple wallets from different financial institutions, are sold in bulk for significant profits.

Some groups expedite fraudulent activity by setting up fake e-commerce businesses on platforms like Stripe or Zelle to cash out funds.

A more sophisticated method involves “Ghost Tap” technology, which uses an Android app called ZNFC to relay Near Field Communication (NFC) transactions globally.

With this tool, scammers can execute tap-to-pay transactions remotely from anywhere in the world. The app is sold for $500 per month and includes 24/7 support.

Research indicates that these operations have caused an estimated $15 billion in fraudulent charges annually.

Security experts have observed nearly 33,000 domains tied to these phishing schemes, with losses averaging $250 per compromised card.

The financial sector has struggled to counter these attacks due to their reliance on OTPs sent via SMS for mobile wallet authentication a vulnerability exploited by phishers.

Some European and Asian banks now require customers to authenticate through their banking apps before linking wallets.

However, broader solutions may involve updating payment terminals to detect relayed NFC transactions and enhancing account monitoring by tech giants like Apple and Google.

Despite these challenges, experts emphasize that stronger collaboration between financial institutions and technology providers is essential to curb this growing threat.

Neither Apple nor Google has commented on their role in addressing these vulnerabilities.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a…

9 minutes ago

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…

14 hours ago

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…

14 hours ago

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…

14 hours ago

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…

14 hours ago

New Bookworm Malware Using SLL Sideloading Technique To Windows

Cybersecurity researchers from Palo Alto Networks' Unit 42 disclosed the resurgence of the Bookworm malware,…

14 hours ago