Russian police bust bank-account hacking gang that used NFCGate-based malware

Russian police said they have dismantled a criminal group that stole millions from bank customers using malware built on NFCGate, a legitimate open-source tool increasingly exploited by cybercriminals worldwide.

According to Russia’s Interior Ministry, police detained several suspected members of the group — including the developer and main administrator of the malicious tool — late last week. The ministry did not identify the malware variant.

Interior Ministry spokesperson Irina Volk, who announced the arrests Friday on her Telegram channel, said the tool enabled remote thefts from bank cards “across nearly all of Russia.” Preliminary losses exceed 200 million rubles (about $2.6 million).

The malicious mobile application was distributed through WhatsApp and Telegram and disguised as software from legitimate banks. Victims were first contacted by phone and persuaded to install a fraudulent banking app.

During the fake “authorization” process, they were instructed to hold their bank card to the back of their smartphone and enter their PIN — a step that allowed attackers to harvest card credentials and withdraw funds from ATMs anywhere in the country without the cardholder’s involvement.

Investigators are still working to identify the full network behind the scheme, Volk said.

NFCGate, designed to relay NFC data between nearby devices, has become a favored tool for financial-theft malware because it allows attackers to emulate victims’ cards. Its misuse has escalated in recent years, with researchers documenting increasingly sophisticated variants in and beyond Russia.

Earlier this year, a Russian cybersecurity firm reported the country’s first data-stealing attacks using a modified version of NFCGate dubbed SuperCard, which was also deployed against bank customers in Italy.

According to Russian security company F6, at least 1.6 billion rubles (roughly $18 million) had been stolen from Russian customers by the end of 2025 using various NFCGate-based malware strains.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

UK intelligence warns AI ‘prompt injection’ attacks might never go away

Next Post

Three hacking groups, two vulnerabilities and all eyes on China

Related Posts

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, 2025. "Since its debut, the group's Telegram channels have been removed and recreated at least 16 times under varying iterations of the original name – a recurring cycle reflecting platform moderation and the operators'
Read More

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang. "These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python's pickle deserialization,"
Read More

Beware the Hidden Costs of Pen Testing

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.  The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to
Read More