Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Android Malware Exposed: The Growing Threat of NFC Relay Attacks




A new Android malware, dubbed 'SuperCard X', has emerged with remarkable technical sophistication, specifically designed to target NFC-enabled devices via relay attacks. By exploiting vulnerabilities in user behavior, this malicious entity can siphon sensitive payment card information, paving the way for point-of-sale and ATM transactions. With its evasive tactics and customizability, SuperCard X poses a significant threat to Android users worldwide.

  • SuperCard X is a new malware-as-a-service platform targeting Android devices via NFC relay attacks.
  • The malicious entity is linked to Chinese-speaking threat actors and exhibits similarities with open-source projects NFCGate and NGate.
  • It was discovered in Italy, where it was used in high-profile attacks showcasing sophisticated customization options.
  • The attack involves sending fake SMS or WhatsApp messages to victims, coaxing them into divulging card information and installing malware.
  • The malware can steal card chip data and transmit it to attackers, enabling point-of-sale transactions or ATM withdrawals.
  • SuperCard X has evaded detection by traditional antivirus software and leverages emulation of smartcard protocols to appear legitimate.
  • Google has informed Android users about potential risks associated with SuperCard X and offers protection through Google Play Protect.



  • In a chilling revelation that highlights the ever-evolving nature of cyber threats, a new malware-as-a-service (MaaS) platform has emerged, specifically designed to target Android devices via NFC relay attacks. Dubbed 'SuperCard X', this malicious entity is linked to Chinese-speaking threat actors and exhibits striking similarities with the open-source project NFCGate and its notorious spawn, NGate. The latter has been implicated in several high-profile attacks in Europe over the past year.

    According to mobile security firm Cleafy, SuperCard X was discovered in Italy, where it was used in multiple samples of attacks that showcased a level of sophistication hitherto unseen. These instances demonstrated an unsettling degree of customization, as affiliates were offered the option of crafting bespoke builds tailored to regional or specific needs. This marked a stark departure from traditional malware campaigns, which have historically been more generic in nature.

    The modus operandi (MO) employed by SuperCard X is straightforward: the attack commences with the victim receiving a fake SMS or WhatsApp message purportedly emanating from their bank. The message purports to necessitate a phone call to resolve issues stemming from a suspicious transaction. Upon answering the call, the scammer poses as bank support and utilizes social engineering tactics to coax the victim into divulging their card number and PIN.

    Subsequent to this initial deception, the threat actors persuade the user to install a malicious app (Reader) masquerading as a security or verification tool. This malware is surreptitiously embedded within the device, requesting only minimal permissions—chiefly access to the NFC module—a privilege sufficient to facilitate the data theft.

    Upon installation of Reader, the scammer instructs the victim to tap their payment card onto the phone, thus allowing the malware to peruse the card chip data and transmit it to the attackers. This intercepted information is then utilized by another app called Tapper on an Android device running another malicious application. The latter acts as a digital duplicate of the victim's card, thereby enabling attackers to effect point-of-sale (POS) transactions or ATM withdrawals.

    The deployment of SuperCard X has sparked considerable concern among cybersecurity experts and financial institutions alike, given its remarkable capacity for evading detection by traditional antivirus software. Cleafy notes that this malware has not been flagged by any antivirus engine on VirusTotal—a testament to its novel design and technical prowess. Furthermore, the malicious application leverages an emulation of smartcard protocols—specifically ATR (Answer to Reset)—to create a card appearance that is indistinguishable from legitimate payment terminals.

    The attacks perpetuated by SuperCard X have garnered significant attention due to their sophistication, coupled with the relative ease with which they can be executed. This underscores the evolving nature of cyber threats and the imperative for users to exercise heightened vigilance when dealing with unsolicited communications purportedly emanating from financial institutions.

    In response to this growing menace, Google has taken steps to inform Android users about potential risks associated with SuperCard X. According to a statement from a Google spokesperson, "Based on our current detection, no apps containing this malware are found on Google Play. Android users are automatically protected by Google Play Protect—this feature is enabled on Android devices with Google Play Services—and can warn or block applications known to exhibit malicious behavior, even when those apps originate from external sources."

    In conclusion, the emergence of SuperCard X serves as a stark reminder of the ongoing threat landscape in the digital realm. As such, it is imperative that users remain vigilant and take proactive measures to safeguard their personal data against such nefarious activities.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-Android-Malware-Exposed-The-Growing-Threat-of-NFC-Relay-Attacks-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/supercard-x-android-malware-use-stolen-cards-in-nfc-relay-attacks/


  • Published: Sat Apr 19 16:27:09 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us