Android malware used to steal ATM info from customers at three European banks

Avatar

A strain of malware built for Android devices was used by cybercriminals to rob three Czech banks in a campaign uncovered over the last nine months. 

Researchers from Slovakia-based cybersecurity firm ESET named the malware NGate and said it was used by cybercriminals as part of a  larger string of attacks where hackers set up malicious banking applications that were nearly identical to legitimate European ones in an effort to steal user data in an elaborate phishing scheme.

But Lukáš Štefanko, who discovered the novel threat and technique, explained that the malware used in the attacks on Czech victims stood out because it has the ability to relay someone’s payment cards through a malicious app installed on a victim’s Android device. 

Štefanko said the hackers discovered a way to relay near field communication (NFC) data from the victims’ physical payment cards through their compromised Android smartphones to the attacker’s device.

From there, the hackers used the stolen data to conduct ATM transactions and if this failed, the hackers had a backup plan of simply transferring funds from the victim’s bank account to other accounts. 

“We haven’t seen this novel NFC relay technique in any previously discovered Android malware,” Štefanko said.

The cybercriminals behind the campaign were able to convince victims to download the malicious app after sending phishing messages purporting to be from the person’s bank. The messages claimed their device was compromised and that the victims would need to download an app to resolve the issue — inadvertently infecting their device in the process. 

The app was never available in the official Google Play store and most victims downloaded the app from a link sent over text. The malware was delivered through domains made to look like banking websites or official mobile banking apps. 

Once NGate is installed, it shows a fake website that asks the victim to enter banking information like client IDs, dates of birth, PIN codes and more. 

The app also asks victims to turn on the NFC feature of their devices and to place their payment card on the back of their smartphone until the malicious app registers the card. 

The hackers then use the NFCGate tool — which was built to relay NFC data between two devices — to steal the card information. 

ESET researchers have been tracking the activities of the actors behind the campaign since November 2023, noting that they operated in Czechia. They saw the group specifically target the customers of prominent Czech banks in November.

They noted that the group stopped operating for a period of time after the alleged arrest of an unnamed member in March 2024.

But ESET added that this is the first time they had ever seen Android malware with this kind of capability used in the wild. 

Štefanko urged people to be more wary online before taking any actions, checking the URLs of websites, keeping PIN numbers secure and turning off the NFC function when it is not needed. He also suggested using virtual cards — which give people temporary card information they can enter on websites.

CybercrimeNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide

Next Post

US charges alleged member of Russian Karakurt ransomware group

Related Posts

Why Pay A Pentester?

The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against the grandmaster Garry Kasparov in 1997, only to be stunned when the machine claimed victory. Fast forward to today, would we have imagined just three years ago that a chatbot could write essays, handle customer support calls, and even craft commercial
Avatar
Read More

Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues

Veeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution. The list of shortcomings is below - CVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup & Replication that allows unauthenticated remote code execution. CVE-2024-42024 (CVSS score: 9.1
Avatar
Read More