Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Data»Criminals use malware to steal near-field communication data
Data

Criminals use malware to steal near-field communication data

5gantennas.orgBy 5gantennas.orgAugust 23, 2024No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Recent research by cybersecurity firm ESET has revealed details about a new attack campaign targeting Android smartphone users.

The cyber attack is based on complex social engineering techniques and the use of new Android malware, allowing it to steal users’ Near Field Communication data and withdraw cash from NFC-enabled ATMs.

Threat actors continue to improve their techniques

As ESET notes, the threat actors initially exploited Progressive Web App technology, which allows for the installation of apps from any website outside of the Play Store, and is available on desktop Chromium-based browsers as well as supported browsers such as Firefox, Chrome, Edge, Opera, Safari, Orion and Samsung Internet Browser.

Accessed directly through the browser, PWAs are flexible and don’t usually suffer from compatibility issues. Once installed on your system, PWAs can be recognized by their icon, which features a small browser icon added to it.

An example of a PWA icon (left) that mimics a real app (right).
Example of a PWA icon (left) that mimics a real app (right). Image: ESET

Cybercriminals use PWAs to lure unsuspecting users to full-screen phishing websites where they harvest credentials and credit card information.

The threat actors involved in this campaign switched from PWAs to WebAPKs, a more advanced type of PWA. The difference is subtle: PWAs are apps built using web technologies, while WebAPKs use technology to integrate the PWA as a native Android application.

From an attacker’s perspective, using WebAPK makes it more stealthy as it doesn’t have a little browser icon on the icon.

The difference between the icons: the legitimate app on the left, the malicious WebAPK in the middle, and the PWA on the right.
Different icons: left is the legitimate app, center is the malicious WebAPK, right is the PWA. Image: ESET

The victim downloads and installs a standalone app from the phishing website, and the person does not request any additional permissions to install an app from a third-party website.

These fraudulent websites often mimic parts of the Google Play Store to confuse users and make them believe that the installation is coming from the Play Store, when in fact it is happening directly from the fraudulent website.

An example of a phishing website that mimics Google Play to trick users into installing a malicious WebAPK.
An example of a phishing website that mimics Google Play to trick users into installing a malicious WebAPK. ​​Image: ESET

Must-Read Security Coverage

NGate malware

On March 6th, the same distribution domains used in the observed PWA and WebAPK phishing campaigns suddenly began spreading a new malware called NGate, which, once installed and executed on a victim’s phone, opens a fake website and requests the user’s banking information, which is then sent to the threat actor.

However, the malware also embeds a tool called NFCGate, which is a legitimate tool that can relay NFC data between two devices without the need to root the device.

Once users have provided their banking details, they are then prompted to enable the NFC feature on their smartphone and hold their credit card against the back of the phone until the app recognises the card.

Perfect social engineering

While enabling NFC in an app to recognize a payment card may seem suspicious at first, the social engineering techniques deployed by threat actors explain the scenario.

Cybercriminals send users SMS messages with links to phishing websites that mention tax returns and impersonate banking companies, directing them to malicious PWAs. Once the app is installed and run, it asks users for their banking credentials.

At this point, the threat actor calls the user, posing as the banking company. The victim is informed that their account has been compromised, possibly due to a previous SMS. The user is then asked to change their PIN and verify their bank card details using a mobile application to secure their bank account.

The user then receives a new SMS containing a link to the NGate malware application.

Once installed, the app asks users to enable NFC and to recognize their credit card by tapping it against the back of the phone, transmitting the data to the attacker in real time.

A complete plan of attack.
The complete attack scheme. Image: ESET

Monetizing stolen information

The information stolen by attackers enables them to carry out common frauds, such as withdrawing funds from your bank account or using your credit card information to make online purchases.

However, the NFC data stolen by cyber attackers could enable them to emulate the original credit card and withdraw cash from ATMs that use NFC, a previously unreported attack vector.

Attack Range

ESET research uncovered an attack in the Czech Republic, which exclusively targeted banking companies there.

A 22-year-old suspect was arrested in Prague with approximately 6,000 euros (6,500 USD) in his possession. Czech police say the money was stolen from three previous victims, suggesting the threat actor may have stolen even more money during this campaign.

However, as ESET researchers note, “the possibility of it spreading to other regions and countries cannot be ruled out.”

We expect to see more cybercriminals using similar techniques to steal money via NFC in the near future, especially as NFC becomes more and more popular among developers.

How to protect yourself from this threat

To avoid becoming a victim of this cyber attack, users should take note of the following:

  • Verify the source of any applications you download and carefully examine the URL to ensure legitimacy.
  • Avoid downloading software from sources other than official ones, such as the Google Play Store.
  • Don’t give out your payment card PIN codes – banks will never ask you for this information.
  • It uses digital versions of traditional physical cards: these virtual cards are stored securely on your device and can be protected by additional security measures such as biometric authentication.
  • Install security software on your mobile device to detect malware and unwanted applications on your phone.

Users should disable NFC on their smartphones when not in use. This protects against further data theft. Attackers can read card data from handbags, wallets, and backpacks left unattended in public places. They can then use that data to make small contactless payments. Protective cases can also be used to create an effective barrier against unwanted scanning.

If the call is from a bank employee, if you have any suspicions, hang up and call your usual bank contact, preferably from a different phone.

Disclosure: I work for Trend Micro, but the opinions expressed in this article are my own.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHas my Social Security number been stolen? Questions about the national data breach
Next Article Starlink adds new out-of-area charges to combat fraudsters
5gantennas.org
  • Website

Related Posts

Crypto Markets Rise on Strong US Economic Data

August 29, 2024

Microsoft approves construction of third section of Mount Pleasant data center campus

August 29, 2024

China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

August 29, 2024

Comments are closed.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Business News | Communications Minister Scindia promotes 6G leadership and nationwide broadband in meeting with telecom operators

By 5gantennas.orgAugust 24, 2024

New Delhi [India]August 24 (ANI): Union Telecom Minister Jyotiraditya Scindia along with Minister of State…

SingTel and SK Telecom prepare for the 6G future

July 8, 2024

Apple focuses on 6G for future iPhones

December 11, 2023

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.