Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NFC Relay Malware Surge In Europe

October 31, 2025
Reading Time: 3 mins read
in Alerts
Merkle Hit By Major Cyberattack

Near-Field Communication (NFC) relay malware has become massively popular across Eastern Europe, with security researchers uncovering more than 760 malicious Android apps using this technique to steal users’ payment card details in just the past few months. This is a significant shift from older cybercrime methods. Instead of relying on traditional banking trojans that use screen overlays to phish credentials or remote access tools for fraudulent transactions, NFC malware directly exploits Android’s Host Card Emulation (HCE) capability. HCE allows an Android device to act like a contactless payment card, a feature that the malware now abuses to emulate or steal actual credit card and payment data.

The way this malware operates is highly technical and effective. These malicious apps are designed to intercept and capture specific EMV fields (the data from a chip card) and then interact with a Point-of-Sale (POS) terminal. They either respond to the terminal’s commands (APDU commands) with attacker-controlled replies or, more often, forward the terminal’s requests to a remote server. This server then crafts the proper, fraudulent APDU responses, effectively enabling a payment transaction at the POS terminal without the physical cardholder ever being present.

This technique was first observed in the wild in Poland in 2023, quickly followed by targeted campaigns in the Czech Republic. The threat has since escalated dramatically, leading to more massive attack waves across regions like Russia. Over time, multiple variants of this NFC malware have emerged, each adopting a slightly different approach to maximize theft. These variants include simple data harvesters that exfiltrate card data to endpoints like Telegram, sophisticated relay toolkits that forward payment data to remote paired devices, and “ghost-tap” payments where HCE responses are manipulated to authorize POS transactions in real time. Criminals also use Progressive Web Apps (PWAs) or fake banking apps, registering them as the default payment handler on the victim’s Android device.

According to the mobile security firm Zimperium, a key partner in Google’s App Defense Alliance, the rise of NFC malware on Android has been explosive, especially within Eastern Europe. Zimperium’s research emphasizes the rapid growth, explaining that “What began as just a few isolated samples has now expanded to more than 760 malicious apps observed in the wild—demonstrating that NFC relay abuse is not slowing down but continuing to accelerate.” Campaigns that were previously isolated are now broadening their geographical reach, now encompassing Russia, Poland, the Czech Republic, Slovakia, and other countries.

The scope of the operation is vast. Zimperium has successfully identified over 70 command-and-control (C2) servers and numerous app distribution hubs actively supporting these criminal campaigns. Furthermore, they have pinpointed dozens of Telegram bots and private channels that are used both to exfiltrate the stolen payment data and to coordinate the ongoing malicious operations. The apps used to trick victims and distribute this malware often impersonate legitimate services such as Google Pay or well-known financial institutions, including Santander Bank, VTB Bank, Tinkoff Bank, ING Bank, Bradesco Bank, and Promsvyazbank (PSB).

Reference:

  • Massive Surge Of NFC Relay Malware Steals Credit Cards Across Europe
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Merkle Hit By Major Cyberattack

Active Exploits Hit Dassault And XWiki

October 31, 2025
Merkle Hit By Major Cyberattack

CISA And NSA Warn To Secure Microsoft

October 31, 2025
Windows Cloud Files Minifilter Exploited

Cloaked AI Attack Makes Crawlers Cite Lies

October 30, 2025
Windows Cloud Files Minifilter Exploited

Windows Cloud Files Minifilter Exploited

October 30, 2025
Windows Cloud Files Minifilter Exploited

PhantomRaven Npm Campaign Hides Bad Code

October 30, 2025
Paterson & Dowding Data Breach Confirmed

Npm Packages Steal Developer Logins

October 29, 2025

Latest Alerts

NFC Relay Malware Surge In Europe

Active Exploits Hit Dassault And XWiki

CISA And NSA Warn To Secure Microsoft

PhantomRaven Npm Campaign Hides Bad Code

Cloaked AI Attack Makes Crawlers Cite Lies

Windows Cloud Files Minifilter Exploited

Subscribe to our newsletter

    Latest Incidents

    Ribbon Breached By State Hackers

    EY Data Leak On Microsoft Azure

    Merkle Hit By Major Cyberattack

    Family Health West Hit By Cyberattack

    Canada Warns Hackers Breach Critical ICS

    Tasmanian Gov Agencies Hit By Cyber Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial