NFCShare Android Trojan: NFC card data theft via malicious APK
好的,我现在需要帮用户总结一篇关于安卓恶意软件的文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是D3Lab团队分析了一个德国银行的钓鱼活动中的恶意应用。这个应用伪装成银行的更新,诱导用户输入手机号和下载恶意APK。安装后,应用会引导用户进行假的卡片验证,读取NFC数据和PIN码,并通过WebSocket发送到远程服务器。 技术细节方面,应用使用ISO-DEP协议读取卡片信息,并且字符串进行了XOR编码。命名空间和功能都与“分享”NFC数据相关,所以命名为NFCShare。此外,文章提到该恶意软件可能与中国相关的工具或团伙有关联。 现在我要把这些信息浓缩到100字以内。首先概述恶意软件的来源和目的:伪装成银行应用,诱导下载。然后描述其功能:读取NFC数据和PIN码,并通过WebSocket传输。最后提到命名原因和可能的关联。 要注意用词简洁,避免重复信息。比如,“伪装成银行应用”可以简写为“伪装银行应用”。同时,确保涵盖所有关键点:来源、功能、技术手段、命名原因、关联。 最后检查字数是否符合要求,并确保语句通顺。 </think> D3Lab分析了一款伪装成德意志银行应用的恶意软件,通过钓鱼邮件传播。该软件诱导用户下载并安装恶意APK,在假装验证银行卡的过程中读取NFC数据及卡 PIN,并通过WebSocket将数据发送至远程服务器。该恶意软件被命名为NFCShare,因其核心功能为共享 NFC 卡数据至远程服务器。 2026-1-29 09:0:44 Author: www.d3lab.net(查看原文) 阅读量:0 收藏

Executive Summary

The D3Lab team analyzed an Android application distributed through a Deutsche Bank phishing campaign. Victims are prompted to enter their phone number, then instructed to “update” their banking app by downloading a malicious APK named deutsche.apk. The APK presents itself as “Support Nexi” and guides the user through a fake “card verification” flow: bring the card near the phone, keep it close while “authenticating,” and enter the card PIN. Under the hood, the app reads NFC card data (ISO‑DEP) and exfiltrates it to a remote WebSocket endpoint.

Based on consistent internal artifacts (package naming, classes, messages, and UI flow), we assign this new cluster the family name NFCShare.

Distribution: Deutsche Bank phishing flow

The infection chain starts with a bank‑themed phishing site mimicking Italian Deutsche Bank. The victim is asked for a mobile number and then told to update the bank app. The “update” is delivered as an APK (deutsche.apk). After installation, the app claims to be “Support Nexi” and drives the user through a fake security verification designed to harvest NFC card data and the card PIN.

What the app does (user flow)

The UI is implemented as a local HTML/JS page loaded into a WebView:

  • Step 1: “Bring your card close”
  • Step 2: “Keep the card near the phone while authentication completes”
  • Step 3: PIN collection (4 or 6 digits)

This matches a typical NFC‑relay/harvesting workflow: capture card data via NFC and request the PIN to enable fraudulent transactions.

Technical analysis highlights

1) NFC reading and card data extraction

The app uses android.nfc.tech.IsoDep (ISO‑DEP/ISO 14443‑4) to communicate with payment cards and builds a CardInfoitmanteis object containing:

  • Card number
  • Card type
  • Label
  • Expiration date

The data is serialized into a string format:

number &amp; type &amp; label &amp; MM/yy

2) Network exfiltration via WebSocket

The app connects to a WebSocket endpoint and sends JSON messages containing NFC data. The connection string is obfuscated and resolved at runtime.

ws://38[.]47[.]213[.]197:7068/

3) String obfuscation (NPStringFog)

Strings are XOR‑encoded and decoded using a hardcoded key:

Sample decoding (from smali):

const-string v0, "1E07544A584359495D43405746434F565043545247465948"
invoke-static {v0}, Lobfuse/NPStringFog;->decode(Ljava/lang/String;)Ljava/lang/String;

=> "ws://38[.]47[.]213[.]197:7068/"

Why we call it NFCShare (family attribution)

We chose the family name NFCShare because of consistent internal naming and behavior:

  • Namespace/strings: nfc.share.* appears in internal package paths and resources.
  • Function: the malware’s core purpose is to “share” (exfiltrate) NFC card data to a remote server.

Supporting internal artifacts:

  • Package/namespace: nfc.share.itnamteis.*
  • Strings: nfc.share and other NFC‑related UI text
  • Channels: CARD_INFO_CHANNEL, CARD_REMOVED, SEND_CHANNEL in internal enums

This naming is stable across the codebase and better reflects the malware’s core behavior than the external branding (“Support Nexi”).

Links to known Chinese‑linked tooling and related families

We observed several indicators suggesting a Chinese‑linked operator or tooling lineage:

  • The app embeds Chinese text such as 发送端 (“sender”).
  • String obfuscation and naming patterns are consistent with Chinese Android malware tooling.

We also note the following contextual overlap reported by defenders:

  • The C2 IP was associated with SuperCardX activity in November 2025.
  • The flow is conceptually similar to RelayNFC as analyzed by Cyble (Brazil‑targeting NFC relay malware).

IOCs

Hashes

  • SHA‑256: afbe6751d339fbc5b7bddd29429a11740e82fef935a61acaf2fe5487444dbed4

Package / App

  • com.modol.nap
  • App label: Support Nexi

Network

  • ws://38[.]47[.]213[.]197:7068/
  • portale-deut[.]com

文章来源: https://www.d3lab.net/nfcshare-android-trojan-nfc-card-data-theft-via-malicious-apk/
如有侵权请联系:admin#unsafe.sh