ThreatFabric has identified a new cash-out tactic that wasn’t seen before called “Ghost Tap”, which cybercriminals use to exploit stolen credit card details linked to mobile payment services like Google Pay and Apple Pay. This method involves relaying NFC (Near Field Communication) traffic to perform transactions anonymously and on a larger scale. Cybercriminals use tools like NFCGate to relay NFC traffic between a device with the stolen card and a point-of-sale terminal, allowing them to make purchases without being physically present at the location. This tactic poses significant challenges for financial institutions in detecting and preventing such fraudulent activities. I have explained how it works and demonstrated NFC relay from Google Wallet app in the video below.
This technique introduces several new elements that make it particularly concerning:
In summary, with stolen physical payment card it is possible to make small contactless payments that are limited by the bank. Anything above this threshold, requires a PIN to enter.
Payment card enrolled in wallet app on threat actor device doesn’t request to enter a PIN for contactless payments above the threshold as part of authorization, rather only authorization of device owner is necessary instead of card holder. Because of that, this type of attack effectively bypasses limit for contactless payments without knowing a PIN.
This is the second occurrence of using NFC relay via NFCGate toolkit by threat actors this year. For the first documented time it was leveraged to send data from contactless payment card of victims through victims smartphone, where NGate malware was installed, to attacker’s smartphone that could withdraw money from ATM. Demonstration is visualized in the video below.
I will present this research with my insights at cybersecurity conference AVAR 2024. If you are attending the conference, feel free to come by and say hello :).
Since the whole attack scenario relies on the fact that victim’s device is compromised already by a malware that lures the credit card detail, make sure to install apps only from trustworthy sources.
Pay attention to email received from a bank. When a credit card is enrolled on a second smartphone, the first smartphone is typically not notified directly. However, the card issuer or the mobile payment service (like Google Pay or Apple Pay) may send an email or push notification to the account holder to inform them of the new device enrollment. This is a security measure to alert the cardholder of any potential unauthorized activity.
Ghost Tap enables transactions to be carried out anonymously and on a larger scale. The use of tools like NFCGate allows the relay of NFC traffic between a device with the stolen card and a point-of-sale terminal, making it difficult to trace the fraud back to the perpetrators. This method poses significant challenges for financial institutions in detecting and preventing such fraudulent activities. The transactions appear legitimate because they are processed through standard mobile payment services, making it harder to identify and block suspicious activity.