New payment-card scam involves a phone call, some malware and a personal tap

Avatar

Financial institutions should be on alert for a scam that combines social engineering, previously undocumented malware and mobile phones’ near-field communication (NFC) capabilities to compromise payment cards, researchers said Friday.

The fraudsters target Android devices with “a series of well-orchestrated steps” that allow them to steal money from individual victims, according to Cleafy, the cybersecurity firm that tracked the scheme in its home country of Italy.

The malware, which Cleafy is calling SuperCard X, overlaps with malicious code first reported by researchers at Slovakia-based ESET in 2024. Dubbed NGate, that malware was used to steal money from customers of three Czech banks. The abuse of NFC technology — when a device recognizes a nearby item like a payment card — is new, Cleafy says.

The Italian job works like this: The hackers reel in a potential victim with a scary text message that impersonates a bank fraud alert. If the recipient calls the associated phone number, they’re directed to take more steps to “secure” their account. The hackers ask for PINs and try to get victims to remove any spending limits on the card. 

The SuperCard X malware comes next, Cleafy says, as the attackers typically text a link “often disguised as a security tool or a verification utility.” 

“As the final stage of the manipulation, the [threat actors] instruct the victim to bring their physical debit or credit card into proximity to their infected mobile device,” Cleafy says. “The SuperCard X malware then silently captures the card details transmitted via NFC.”

The NFC process “allows the attacker to access the stolen funds instantly and potentially outside traditional fraud channels that typically involve bank transfers,” the report says.

SuperCard X appears to be malware-as-a-service (MaaS) offered by “Chinese-speaking” hackers, Cleafy says, meaning that the people who created the code aren’t necessarily those who are using it in Italy.  

“The nature of MaaS enables multiple affiliates to operate locally within their own regions or areas of specific interest,” the report says. “Consequently, we cannot exclude the possibility of similar or related campaigns being active in other regions globally.”

Cleafy also notes that in similar payment-card scam operations, specific banks often are the targets, but in the SuperCard X campaign, any card is potentially up for grabs. “[T]he operational context of this attack is mainly agnostic of the financial institution involved since the ultimate target of the fraudsters is the customers’ debit or credit cards, regardless of the issuing bank,” the researchers say.

Cybersecurity companies and law enforcement agencies have been warning about the rise of fraud involving NFC technology. U.S. authorities arrested two Chinese nationals earlier this year in a “tap to pay” scam.

CybercrimeNewsTechnologyMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Next Post

Alleged SmokeLoader malware operator facing federal charges in Vermont

Related Posts

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution

A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE-2025-22604, carries a CVSS score of 9.1 out of a maximum of 10.0. "Due to a flaw in the multi-line SNMP result parser, authenticated users can inject
Avatar
Read More

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2024-57968 - An unrestricted file upload vulnerability in Advantive VeraCore
Avatar
Read More