SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks
一种名为SuperCard X的新型Android恶意软件即服务(MaaS)平台利用NFC中继攻击技术,通过社会工程学和恶意应用感染用户设备,窃取支付卡数据并进行欺诈性提款。该平台针对意大利银行客户和信用卡发行机构,利用伪装的安全警报短信诱骗用户安装恶意应用,并通过电话进一步诱导用户泄露敏感信息。攻击者利用被感染设备捕获的卡数据进行未经授权的交易。 2025-4-21 15:13:0 Author: thehackernews.com(查看原文) 阅读量:16 收藏

Technology / Mobile Security

SuperCard X Android Malware

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts.

The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis. There is evidence to suggest that the service is promoted on Telegram channels.

SuperCard X "employs a multi-stage approach combining social engineering (via smishing and phone calls), malicious application installation, and NFC data interception for highly effective fraud," security researchers Federico Valentini‍, Alessandro Strino, and Michele Roviello said.

Cybersecurity

The new Android malware, the work of a Chinese-speaking threat actor, has been observed being propagated via three different bogus apps, duping victims into installing them via social engineering techniques like deceptive SMS or WhatsApp messages -

  • Verifica Carta (io.dxpay.remotenfc.supercard11)
  • SuperCard X (io.dxpay.remotenfc.supercard)
  • KingCard NFC (io.dxpay.remotenfc.supercard)

The messages impersonate bank security alerts to induce a false sense of urgency by urging recipients to call a specific number to dispute the transaction.

The infection chain then moves to what's called a Telephone-Oriented Attack Delivery (TOAD), where the threat actors manipulate victims to install the app under the guise of security software through direct phone conversations. The threat actors have also been found to employ persuasive tactics to glean victims' PINs and instruct them to remove any existing card limits, thereby allowing them to drain the funds easily.

SuperCard X Android Malware

At the core of the operation is a previously undocumented NFC relay technique that enables threat actors to fraudulently authorize point-of-sale (PoS) payments and Automated Teller Machine (ATM) withdrawals by intercepting and relaying NFC communications from infected devices.

To do this, the attackers urge the victims to bring their debit or credit card in close physical proximity to their mobile device, which then allows the SuperCard X malware to stealthily capture the transmitted card details and relay them to an external server. The harvested card information is then utilized on a threat actor-controlled device to conduct unauthorized transactions.

The application that's distributed to victims for capturing NFC card data is called a Reader. A similar app known as Tapper is installed on the threat actor's device to receive the card information. Communication between the Reader and Tapper is carried out using HTTP for command-and-control (C2) and requires cybercriminals to be logged in.

As a result, threat actors are expected to create an account within the SuperCard X platform before distributing the malicious apps, after which the victims are instructed to enter the login credentials provided to them during the phone call.

This step serves as a key cog in the overall attack as it establishes the link between the victim's infected device and the threat actor's Tapper instance, which then enables the card data to be relayed for subsequent cash outs. The Tapper app is also designed to emulate the victim's card using the stolen data, thus fooling PoS terminals and ATMs into recognizing it as a legitimate card.

Cybersecurity

The "Reader" malware artifacts identified by Cleafy carry subtle differences in the login screen, indicating that they are custom builds generated by affiliate actors to tailor the campaigns according to their needs. In addition, SuperCard X makes use of mutual TLS (mTLS) to secure communication with its C2 infrastructure.

That threat actors could deceive unsuspecting users into altering critical settings over phone calls hasn't gone unnoticed by Google, which is said to be working on a new Android feature that effectively blocks users from installing apps from unknown sources and granting permissions to accessibility services.

While there is currently no evidence that SuperCard X is distributed via the Google Play Store, users are advised to scrutinize app descriptions, permissions, and reviews before downloading them. It's also recommended to keep Google Play Protect enabled to safeguard devices against emerging threats.

"This novel campaign introduces a significant financial risk that extends beyond the conventional targets of banking institutions to affect payment providers and credit card issuers directly," the researchers said.

"The innovative combination of malware and NFC relay empowers attackers to perform fraudulent cash-outs with debit and credit cards. This method demonstrates high efficacy, especially when targeting contactless ATM withdrawals."

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html
如有侵权请联系:admin#unsafe.sh