Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
2024-12-2 17:46:47 Author: www.mobile-hacker.com(查看原文) 阅读量:10 收藏

Loading

ThreatFabric has identified a new cash-out tactic that wasn’t seen before called “Ghost Tap”, which cybercriminals use to exploit stolen credit card details linked to mobile payment services like Google Pay and Apple Pay. This method involves relaying NFC (Near Field Communication) traffic to perform transactions anonymously and on a larger scale. Cybercriminals use tools like NFCGate to relay NFC traffic between a device with the stolen card and a point-of-sale terminal, allowing them to make purchases without being physically present at the location. This tactic poses significant challenges for financial institutions in detecting and preventing such fraudulent activities. I have explained how it works and demonstrated NFC relay from Google Wallet app in the video below.

How it works

This technique introduces several new elements that make it particularly concerning:

  1. Steal credit card details: Threat actor steals credit card information from a victim and intercepts OPT codes by using an Android malware that needs to be already installed on victim device.
  2. Enroll credit card: Attacker enrolls stolen card with its own smartphone using a Google Wallet or Apple Pay application.
  3. Avoid detection: To obfuscate location and identity of the threat actor from law enforcement, they use mules and NFC traffic relay.
  4. Using mules: Using intermediaries (mules) they carry out parts of their operations, such as cashing out from stolen cards to further distance themselves from the crime. The mule can be on the other side of the world but connected to internet.
  5. NFC Relay Attack: Unlike traditional methods, Ghost Tap uses relay attacks to exploit stolen credit card details. This allows fraudsters to perform transactions without having the physical card or being near the point-of-sale terminal.
  6. NFCGate: To be able to relay NFC traffic from threat actor that enrolled stolen credit card information to a mule that can make payments at terminal, they used a NFCGate toolkit that can forward NFC session from threat actor device to a mule repeatedly (see Figure 1.).
  7. Buy goods or cash back: Mule can make unauthorized purchase at the terminal on the other side of the world for good and possibly get cash back if possible.
Figure 1. NFCGate architecture (source: https://github.com/nfcgate/nfcgate/wiki)

Bypass PIN verification: Cash-out difference between stolen physical card and card enrolled with mobile wallet app

In summary, with stolen physical payment card it is possible to make small contactless payments that are limited by the bank. Anything above this threshold, requires a PIN to enter.

Payment card enrolled in wallet app on threat actor device doesn’t request to enter a PIN for contactless payments above the threshold as part of authorization, rather only authorization of device owner is necessary instead of card holder. Because of that, this type of attack effectively bypasses limit for contactless payments without knowing a PIN.

History of NFC relay attacks

This is the second occurrence of using NFC relay via NFCGate toolkit by threat actors this year. For the first documented time it was leveraged to send data from contactless payment card of victims through victims smartphone, where NGate malware was installed, to attacker’s smartphone that could withdraw money from ATM. Demonstration is visualized in the video below.

I will present this research with my insights at cybersecurity conference AVAR 2024. If you are attending the conference, feel free to come by and say hello :).

Prevention

Since the whole attack scenario relies on the fact that victim’s device is compromised already by a malware that lures the credit card detail, make sure to install apps only from trustworthy sources.

Pay attention to email received from a bank. When a credit card is enrolled on a second smartphone, the first smartphone is typically not notified directly. However, the card issuer or the mobile payment service (like Google Pay or Apple Pay) may send an email or push notification to the account holder to inform them of the new device enrollment. This is a security measure to alert the cardholder of any potential unauthorized activity.

Conclusion

Ghost Tap enables transactions to be carried out anonymously and on a larger scale. The use of tools like NFCGate allows the relay of NFC traffic between a device with the stolen card and a point-of-sale terminal, making it difficult to trace the fraud back to the perpetrators. This method poses significant challenges for financial institutions in detecting and preventing such fraudulent activities. The transactions appear legitimate because they are processed through standard mobile payment services, making it harder to identify and block suspicious activity.


文章来源: https://www.mobile-hacker.com/2024/12/02/cybercriminals-use-nfc-relay-to-turn-stolen-credit-cards-into-cash-without-a-pin/
如有侵权请联系:admin#unsafe.sh