Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NFC Relay Malware Surge In Europe

October 31, 2025
Reading Time: 3 mins read
in Alerts
Merkle Hit By Major Cyberattack

Near-Field Communication (NFC) relay malware has become massively popular across Eastern Europe, with security researchers uncovering more than 760 malicious Android apps using this technique to steal users’ payment card details in just the past few months. This is a significant shift from older cybercrime methods. Instead of relying on traditional banking trojans that use screen overlays to phish credentials or remote access tools for fraudulent transactions, NFC malware directly exploits Android’s Host Card Emulation (HCE) capability. HCE allows an Android device to act like a contactless payment card, a feature that the malware now abuses to emulate or steal actual credit card and payment data.

The way this malware operates is highly technical and effective. These malicious apps are designed to intercept and capture specific EMV fields (the data from a chip card) and then interact with a Point-of-Sale (POS) terminal. They either respond to the terminal’s commands (APDU commands) with attacker-controlled replies or, more often, forward the terminal’s requests to a remote server. This server then crafts the proper, fraudulent APDU responses, effectively enabling a payment transaction at the POS terminal without the physical cardholder ever being present.

This technique was first observed in the wild in Poland in 2023, quickly followed by targeted campaigns in the Czech Republic. The threat has since escalated dramatically, leading to more massive attack waves across regions like Russia. Over time, multiple variants of this NFC malware have emerged, each adopting a slightly different approach to maximize theft. These variants include simple data harvesters that exfiltrate card data to endpoints like Telegram, sophisticated relay toolkits that forward payment data to remote paired devices, and “ghost-tap” payments where HCE responses are manipulated to authorize POS transactions in real time. Criminals also use Progressive Web Apps (PWAs) or fake banking apps, registering them as the default payment handler on the victim’s Android device.

According to the mobile security firm Zimperium, a key partner in Google’s App Defense Alliance, the rise of NFC malware on Android has been explosive, especially within Eastern Europe. Zimperium’s research emphasizes the rapid growth, explaining that “What began as just a few isolated samples has now expanded to more than 760 malicious apps observed in the wild—demonstrating that NFC relay abuse is not slowing down but continuing to accelerate.” Campaigns that were previously isolated are now broadening their geographical reach, now encompassing Russia, Poland, the Czech Republic, Slovakia, and other countries.

The scope of the operation is vast. Zimperium has successfully identified over 70 command-and-control (C2) servers and numerous app distribution hubs actively supporting these criminal campaigns. Furthermore, they have pinpointed dozens of Telegram bots and private channels that are used both to exfiltrate the stolen payment data and to coordinate the ongoing malicious operations. The apps used to trick victims and distribute this malware often impersonate legitimate services such as Google Pay or well-known financial institutions, including Santander Bank, VTB Bank, Tinkoff Bank, ING Bank, Bradesco Bank, and Promsvyazbank (PSB).

Reference:

  • Massive Surge Of NFC Relay Malware Steals Credit Cards Across Europe
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Delayed Payloads Hit Nuget Packages

Glassworm Found In Three VS Code Addons

November 11, 2025
Delayed Payloads Hit Nuget Packages

Triofox Flaw Lets Hackers Install Remote

November 11, 2025
Delayed Payloads Hit Nuget Packages

Delayed Payloads Hit Nuget Packages

November 11, 2025
Lost iPhone Beware Fake Text Claims

Samsung Flaw Used To Install Landfall

November 10, 2025
Lost iPhone Beware Fake Text Claims

ClickFix Phishing Targets Hotel Systems

November 10, 2025
Lost iPhone Beware Fake Text Claims

Lost iPhone Beware Fake Text Claims

November 10, 2025

Latest Alerts

Glassworm Found In Three VS Code Addons

Triofox Flaw Lets Hackers Install Remote

Delayed Payloads Hit Nuget Packages

Samsung Flaw Used To Install Landfall

ClickFix Phishing Targets Hotel Systems

Lost iPhone Beware Fake Text Claims

Subscribe to our newsletter

    Latest Incidents

    Italian Adviser Targeted By Paragon Spyware

    Manassas Schools Close After Cyberattack

    Chinese Breach Exposes Cyber Weapons

    Oracle EBS Hack Hits Nearly 30 Victims

    China Hackers Target US Nonprofit

    Hackers Steal Sonicwall Cloud Backups

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial