Automatically translated.View original post

New NFC malware NGate disguised as payment app

New NFC Malware NGate Disguised as App for Embedded Payment on Android

Using malware to rob money through NFC (Near Field Connection) is not new, but it is always dangerous because it can lose a lot of money quickly, and this time malware has returned.

According to a report by the website Help Net Security, it has mentioned the detection of a malware distribution campaign of the victim's money-sucking type, or the NGage-family Banking Trojan, a malware family that sucks data from the victim's credit card through NFC scanning on the victim's mobile phone to send data to the hacker's data receiver and then swipe the card at the point of purchase (PoS or Point of Sale) as easily as the card itself, called NFC Relay, which a research team from ESET, a well-known antivirus developer, has revealed that the malware is spread by embedded in a payment application. An NFC Relay called HandyPay, which is usually used to share credit cards and debits correctly. This application has been available for download on the Google Play app store since 2021. The campaign has been focused on mobile phone users using the Android operating system in Brazil since the late 2025.

The reason why malware uses embedded to use HandyPay features is that the research team revealed that the hackers behind it are trying to save costs, because the NFC Relay tools used in malware developers are often sold on the black market as malware rental (MaaS or Malware-as-a-Service) with relatively high fees per month, such as NFC Pay with rents of US $400 per month (Baht 13,005.60), and TX-NFC has rents of US $500 per month (Baht 16,257), while the HandyPay app only asks for donations of €9.99 (380.27). Baht) per month only. In addition to this, no permissions have been requested on board. Just set it up as a default payment application (Default Payment App). It is appropriate to use it as an intermediary for malware insertion.

For the malware code that was inserted into the application, the research team found that there was an Emoji in the string value. The Log made it possible to expect that the hackers behind it had used an artificial intelligence or AI in the large language model (LLM or Large Language Model) to help write the malware code, as well as to show that the hackers who used AI to write malware code were not well versed in programming because they had discarded the unique elements of content. That was created with AI left behind.

As for the campaign used to spread malware, the research team found that hackers used two methods. The first was to use the fake website of Rio de Prêmios, the lottery organization of Rio de Janeiro, which, after the victim entered the site, persuaded the victim to play a card game set for the victim to win 20,000 Brazilian reals every time he played, so that the victim pressed the Claim Reward button, which, after pressing the button, took the victim to the WhatsApp chat application, which account. The account of a hacker impersonating a Brazilian government bank called Caixa Econômica Federal to trick the victim into downloading a HandyPay application with malware in an APK file format impersonating the Rio de Prêmios application, while another method would be to use a fake Google Play page to trick the victim into downloading and installing an app called Proteão Cartão, an application that claims to strengthen credit card security from a name that can be translated as Card Protection. The fake app will come in an APK file format where the victim has to install it on board, which is an installation in Side- Loading

After the victim has installed these applications to the machine, the malware latent application will notify the default NFC payment application. It will then request the victim to enter the PIN code of the victim's card and have the victim tap the card with the NFC enabled machine. The malware will read the card data directly to the hacker's receiver to implement the card, while the PIN number will be sent to the C2 or Command and Control server via the HTTP protocol. The server will be the same as the fake application file store. Insert such malware.

# Trending # Lemon 8 Howtoo # lemon 8 diary # nfc # freedomhack

2 days agoEdited to

... Read moreจากประสบการณ์ที่ติดตามข่าวสารด้านความปลอดภัยไซเบอร์ ผมขอแชร์คำแนะนำในการป้องกันมัลแวร์ NFC อย่าง NGate ที่ปลอมเป็นแอปชำระเงิน HandyPay เพื่อไม่ให้เงินในบัญชีของคุณถูกโจรกรรมอย่างง่ายดาย มัลแวร์นี้มีความอันตรายโดยใช้ฟีเจอร์ NFC ของโทรศัพท์มือถือ Android เพื่อสแกนและเก็บข้อมูลบัตรเครดิตหรือเดบิตของเหยื่อแบบไม่รู้ตัว การปล่อยให้แอปที่ไม่รู้จักหรือแอปปลอมติดตั้งเป็นค่าเริ่มต้นสำหรับชำระเงิน NFC จึงเป็นความเสี่ยงสูงมาก ข้อดีของแอป HandyPay ที่ถูกใช้เป็นฐานมัลแวร์คือ ค่าบริการถูกและไม่ต้องขอสิทธิ์ใช้งานเยอะ ทำให้แฮกเกอร์เลือกใช้เป็นช่องทางสอดไส้มัลแวร์ง่ายขึ้น ผมขอแนะนำให้คุณตรวจสอบแอปที่ดาวน์โหลดว่ามาจากแหล่งที่เชื่อถือได้หรือไม่ เพราะแฮกเกอร์ใช้เว็บไซต์สแกมหรือ Google Play ปลอม ล่อให้เหยื่อติดตั้งไฟล์ APK ด้วยตนเอง (side-loading) ซึ่งเสี่ยงมาก นอกจากนี้เมื่อได้รับคำขอให้ตั้งแอปเป็นค่าเริ่มต้นสำหรับการชำระเงิน NFC หรือต้องป้อนรหัส PIN ควรคิดให้ดีว่ามีความจำเป็นหรือไม่ เพราะมัลแวร์จะดักข้อมูลเหล่านี้ส่งกลับเซิร์ฟเวอร์แฮกเกอร์ทันที ในแง่การป้องกันเชิงเทคนิค ควรอัปเดตระบบปฏิบัติการและแอปต่างๆ เป็นเวอร์ชันล่าสุดเสมอ ใช้ซอฟต์แวร์แอนตี้ไวรัสที่มีชื่อเสียง เช่น ESET เพื่อช่วยตรวจจับพฤติกรรมมุ่งร้าย และอย่าเปิดฟีเจอร์ NFC ตอนที่ไม่จำเป็นเพื่อจำกัดช่องโหว่ สุดท้าย อย่าหลงกลโฆษณาหรือคำชักชวนให้เข้าร่วมแคมเปญแจกของรางวัลผ่านเว็บไซต์แปลก ๆ และอย่ากดลิงก์ที่ส่งมาทางแชทโดยไม่ตรวจสอบอย่างละเอียด เพราะมันอาจเป็นกับดักให้ดาวน์โหลดมัลแวร์ลงเครื่องโดยไม่รู้ตัว การใช้สติและความระมัดระวังจะช่วยรักษาความปลอดภัยทางการเงินของคุณได้ดีกว่าการพึ่งพาเครื่องมือใดเครื่องมือหนึ่งเพียงอย่างเดียว หวังว่าเกร็ดเล็กเกร็ดน้อยจากประสบการณ์นี้จะเป็นประโยชน์สำหรับทุกคนที่ใช้โทรศัพท์และชำระเงินผ่าน NFC ให้อัปเดตตนเองเสมอเพื่อความปลอดภัยทางไซเบอร์ครับ

Related posts

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

11 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

46 likes

Free SVG files for Cricut Design Space. If you’re dealing with crafter’s block, this website has tons of free SVG downloads to spark new project ideas for shirts, stickers, bookmarks, and more. Save this for your next Cricut project and start creating again 💕 #designinspo #creativeart
VlunaWorks

VlunaWorks

5 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

107 likes

Files Copied to USB Drive Disappear? Lets Recover
Copied files to your USB drive, then they vanished? This issue is often caused by hidden files, unsafe ejection, corruption, or failing flash storage. This guide shows how to reveal hidden files, repair USB errors, and recover missing data safely before it gets overwritten. #usb #datarecovery
XanthusTechCore

XanthusTechCore

3 likes

Google probably installed an AI on your computer. Let’s get rid of it together #fyp
PiratePrincessJess

PiratePrincessJess

0 likes

The World’s Deadliest Assassin Disguised Himself as a Frail German Noble—and No One Suspected a Thing.
movie_belle004

movie_belle004

1 like

#batman is not the world’s greatest detective in fact he’s like the latest detective to find the guild. The world’s greatest detective is #detectivechimp #dccomics
Dan!

Dan!

3 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

If you’re staring at Cricut Design Space with zero ideas this is for you! This free SVG website is perfect when you need inspiration fast. Save & share with your crafty bestie 💖 #designinspo #creativeart #DesignProcess #cricutprojects #CricutTutorial
VlunaWorks

VlunaWorks

2 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

#movie #foryou #fyp
Lllla.movie

Lllla.movie

3 likes

Mi primer #comiccon #ny #spanishvocab
Spanish Conale

Spanish Conale

0 likes

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

The Podcast Invite Scheme! Always remember - it’s not your fault ♥️ this happens to so many people. Most importantly: STAY SUSPICIOUS OF EVERYTHING 🥰💕 #podcastinvite #podcast #creator #storytime #scheme
Chloe

Chloe

71 likes

Squid Game Cookies in Sandboxels
#game #gaming #baking #squidgame #dalgona #games
R74n

R74n

87 likes

Free Games! ✅
Free Games! ✅ Yes it’s trusted by many people and it’s the best in the industry! And no malware or virus! Follow for more value! 😉 #freegames #pcgamers #steamgames #gamer #tech
Tech With Unes

Tech With Unes

7 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

551 likes

A colorful Disney tattoo of Stitch from Lilo & Stitch on an arm, featuring a watercolor-style blue and purple splatter background. The character is depicted with a wide, happy grin and outstretched arms, showcasing a vibrant and playful design.
A Disney tattoo on an arm featuring Thumper from Bambi, sitting among purple and blue flowers and tall grass. The tattoo includes the text "Macushla R.I.P. Johnny" below the character, rendered in a traditional tattoo style.
A traditional-style Disney tattoo on a leg depicting Esmeralda from The Hunchback of Notre Dame. She is shown in a flowing purple dress, holding a large crescent moon or hoop, surrounded by golden stars. The text "From my flash! Tiny blast over" is visible.
🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

#fy #fyp #fypシ゚viral #horrorgame Just tired of getting jumped😭, go subscribe to my YT channel.
dis-MALware

dis-MALware

3 likes

💚🖤 #fyp #fypシ #fypシ゚viral #foryoupage #inspire #in
💚🖤 #fyp #fypシ #fypシ゚viral #foryoupage #inspire #inspiration #goviral #motivation #motivate #dankvisionz
Lisa Marie 💚🖤

Lisa Marie 💚🖤

6 likes

#fyp #movie
Hhping

Hhping

18 likes

SATURDAY | 2 MAY 2026 | Cybersecurity Report
The digital frontlines just got a lot more dangerous. Today on Cyber F.M., host Arias Thomas breaks down the industrialization of cybercrime and the collapse of the software supply chain. If you think your "secure" tools are safe, think again. Inside Today’s Broadcast: 🏮 The Paperclip
Cyber F.M.

Cyber F.M.

3 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

263 likes

A vibrant cover image featuring Anjali Viramgama amidst confetti, with the title "Top Cybersecurity Certificates." It highlights key certifications for advancing skills and knowledge in cybersecurity.
A card detailing the Certified Information Security Manager (CISM) certification. It explains CISM focuses on managing information security programs, covering risk management, governance, and incident response.
A card detailing the Certified Ethical Hacker (CEH) certification. It explains CEH focuses on ethical hacking and penetration testing, covering topics like network scanning, malware threats, and social engineering.
Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

112 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

633 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

#evakuasi #sidoajo #fyp
abesso

abesso

1 like

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

151 likes

A black journal featuring a white drawing of Jack Skellington's face and stars, held by a hand.
A journal spread featuring handwritten lyrics for "Sally's Song" from The Nightmare Before Christmas, adorned with various character stickers from the movie.
A journal spread with religious quotes and Bible verses about hope, rejoice, and faith, decorated with cross stickers and floral designs.
Journal Spreads ive done recently
okay its been a few months but so far i did great with all the stickers i love buyings stickers now as a comfort thing idk how to say it ig? but overall my journal spreads look so good so far i hope yall like it js as much as i do<3 anywho im waiting for an upcoming concert to add i cant wait to
mal<3

mal<3

162 likes

10 Ways to Recover Deleted Files on Windows 11
Accidentally deleted important files on Windows 11? Don't panic! Here are 10 effective ways to get them back: 1. Ctrl + Z (Undo Delete) - Quick fix for recent mistakes 2. Check Recycle Bin - First place to look! 3. Data Recovery Software - Best for permanent deletion (Try AOMEI FastRecovery!
techview55hub

techview55hub

0 likes

A person points at a computer screen displaying various app icons and text like "Customize your AI chats with this tool TypingMind" and "The best of Setapp". Overlays read "Tech tips", "Netflix of Productivity", and "Mac Edition!".
Against a lake background, two app icons are shown: CleanMyMac and Paste. Text describes CleanMyMac for tidying Macs and Paste as a clipboard for saving copied content.
Against a lake background, two app icons are shown: TextSniper and Ulysses. Text describes TextSniper for extracting text from visuals and Ulysses for writing and publishing.
Mac Productivity Apps: Make More Time for YOU! 💻
Let’s talk about one of the most important things in our daily routines—our workflow. Whether you’re working for yourself, managing a side hustle, or simply trying to keep everything in check, examining and refining your workflow is key to getting more done with less stress. 💪 By finding simple, ef
Cas Lin

Cas Lin

35 likes

Traveling full-time means your inbox, passwords, and wifi connections are CONSTANTLY at risk — and the scams are getting smarter every year. ✈️🔐 That’s why I use Bitdefender Premium Security to protect my devices from the biggest threats travelers face: • 💳 Credit card & payment fraud • 📧 Phis
MADISON BROOKS TRAVEL

MADISON BROOKS TRAVEL

0 likes

This is the newest way people are getting hacked and if you use AI to answer your questions and give you advice, you need to watch this.Thanks to Huntress for reporting this Follow for more
Cybersecurity Girl

Cybersecurity Girl

15 likes

A desk setup with a curved monitor displaying a pink grid wallpaper and pixel art juice boxes. An overlay on the screen reads "How to Make Your PC Run Faster – 5 Easy Tips!". A keyboard, laptop, and drink are on the desk, with a Lemon8 watermark.
A desk setup with a monitor displaying tips for a faster PC, including "Upgrade Your Storage & RAM," "Keep Your Drivers & OS Updated," and "Check for Malware & Viruses." An overlay highlights "Upgrade Your Storage & RAM and more!" with a Lemon8 watermark.
A desk setup with a monitor displaying instructions for "Disable Startup Programs" and "Clean Temporary Files." The screen shows steps like using Task Manager and deleting temporary files. A keyboard, laptop, and drink are on the desk, with a Lemon8 watermark.
⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

See more