
The D3Lab team analyzed an Android application distributed through a Deutsche Bank phishing campaign. Victims are prompted to enter their phone number, then instructed to “update” their banking app by downloading a malicious APK named deutsche.apk. The APK presents itself as “Support Nexi” and guides the user through a fake “card verification” flow: bring the card near the phone, keep it close while “authenticating,” and enter the card PIN. Under the hood, the app reads NFC card data (ISO‑DEP) and exfiltrates it to a remote WebSocket endpoint.
Based on consistent internal artifacts (package naming, classes, messages, and UI flow), we assign this new cluster the family name NFCShare.


The infection chain starts with a bank‑themed phishing site mimicking Italian Deutsche Bank. The victim is asked for a mobile number and then told to update the bank app. The “update” is delivered as an APK (deutsche.apk). After installation, the app claims to be “Support Nexi” and drives the user through a fake security verification designed to harvest NFC card data and the card PIN.


The UI is implemented as a local HTML/JS page loaded into a WebView:
This matches a typical NFC‑relay/harvesting workflow: capture card data via NFC and request the PIN to enable fraudulent transactions.


The app uses android.nfc.tech.IsoDep (ISO‑DEP/ISO 14443‑4) to communicate with payment cards and builds a CardInfoitmanteis object containing:
The data is serialized into a string format:
number & type & label & MM/yy
The app connects to a WebSocket endpoint and sends JSON messages containing NFC data. The connection string is obfuscated and resolved at runtime.
ws://38[.]47[.]213[.]197:7068/

Strings are XOR‑encoded and decoded using a hardcoded key:
Sample decoding (from smali):
const-string v0, "1E07544A584359495D43405746434F565043545247465948"
invoke-static {v0}, Lobfuse/NPStringFog;->decode(Ljava/lang/String;)Ljava/lang/String;
=> "ws://38[.]47[.]213[.]197:7068/"
We chose the family name NFCShare because of consistent internal naming and behavior:
nfc.share.* appears in internal package paths and resources.Supporting internal artifacts:
nfc.share.itnamteis.*nfc.share and other NFC‑related UI textCARD_INFO_CHANNEL, CARD_REMOVED, SEND_CHANNEL in internal enumsThis naming is stable across the codebase and better reflects the malware’s core behavior than the external branding (“Support Nexi”).
We observed several indicators suggesting a Chinese‑linked operator or tooling lineage:
发送端 (“sender”).We also note the following contextual overlap reported by defenders:
afbe6751d339fbc5b7bddd29429a11740e82fef935a61acaf2fe5487444dbed4com.modol.nap