New Android Trojan PhantomCard Targets Banking Customers in Brazil via NFC Relay Fraud
Summary
Hide â˛
Show âŧ
A new Android malware called PhantomCard is targeting banking customers in Brazil. The trojan abuses near-field communication (NFC) to conduct relay attacks, facilitating fraudulent transactions. PhantomCard is distributed via fake Google Play web pages mimicking card protection apps. Once installed, it requests victims to place their credit/debit card on the phone, transmitting the card data to an attacker-controlled NFC relay server. The malware then prompts victims to enter their PIN, allowing fraudsters to authenticate transactions as if the victim's card was physically present. The malware is part of a Chinese-originating malware-as-a-service (MaaS) offering known as NFU Pay, advertised on Telegram. The actor behind the malware, Go1ano developer, is a serial reseller of Android threats in Brazil and claims PhantomCard works globally and is undetectable.
Timeline
-
14.08.2025 14:06 đ° 1 articles
PhantomCard Android Trojan Targets Banking Customers in Brazil via NFC Relay Fraud
A new Android malware called PhantomCard is targeting banking customers in Brazil. The trojan abuses near-field communication (NFC) to conduct relay attacks, facilitating fraudulent transactions. PhantomCard is distributed via fake Google Play web pages mimicking card protection apps. Once installed, it requests victims to place their credit/debit card on the phone, transmitting the card data to an attacker-controlled NFC relay server. The malware then prompts victims to enter their PIN, allowing fraudsters to authenticate transactions as if the victim's card was physically present. The malware is part of a Chinese-originating malware-as-a-service (MaaS) offering known as NFU Pay, advertised on Telegram. The actor behind the malware, Go1ano developer, is a serial reseller of Android threats in Brazil and claims PhantomCard works globally and is undetectable.
Show sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
Information Snippets
-
PhantomCard is an Android trojan that uses NFC relay attacks to facilitate fraudulent transactions.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
The malware is distributed via fake Google Play web pages mimicking card protection apps.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
PhantomCard requests victims to place their credit/debit card on the phone to transmit card data to an attacker-controlled NFC relay server.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
The malware prompts victims to enter their PIN, allowing fraudsters to authenticate transactions.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
PhantomCard is part of a Chinese-originating malware-as-a-service (MaaS) offering known as NFU Pay.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
The actor behind the malware, Go1ano developer, is a serial reseller of Android threats in Brazil.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Go1ano developer claims PhantomCard works globally and is undetectable.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Similar NFC relay malware includes SuperCard X, KingNFC, and X/Z/TX-NFC.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Southeast Asia has become a testing ground for NFC fraud, with bad actors targeting regional banks and financial service providers.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
SpyBanker is an Android malware campaign targeting Indian banking users, distributed via WhatsApp.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
SpyBanker edits the 'Call Forward Number' to a hard-coded mobile number controlled by the attacker.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
SpyBanker collects victims' SIM details, sensitive banking information, SMS messages, and notification data.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Android malware targeting Indian banking users also drops the XMRig cryptocurrency miner on compromised devices.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Rooting frameworks like KernelSU, APatch, and SKRoot can be used to gain root access and escalate privileges on Android devices.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Chinese-speaking threat actors are using the NFC-based relay technique, called Ghost Tap, to commit retail fraud.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
-
Google Play Protect automatically protects Android users against known versions of this malware.
First reported: 14.08.2025 14:06đ° 1 source, 1 articleShow sources
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits â thehackernews.com â 14.08.2025 14:06
Similar Happenings
HOOK Android Trojan Expands Capabilities with Ransomware Overlays and 107 Remote Commands
A new variant of the HOOK Android banking trojan has been discovered, featuring ransomware-style overlay screens to extort victims. This variant supports 107 remote commands, including new capabilities for capturing user gestures, stealing cryptocurrency wallet information, and displaying fake NFC overlays. The trojan is distributed via phishing websites, bogus GitHub repositories, and malicious APK files, posing a significant threat to financial institutions and users. The HOOK trojan is believed to be an offshoot of the ERMAC banking trojan, which had its source code leaked publicly. The trojan can display fake overlays on financial apps to steal credentials and abuse Android accessibility services for fraud and remote control. The latest version of HOOK includes commands for ransomware overlays, capturing user gestures, and stealing sensitive information like credit card details and lockscreen PINs. It also features transparent overlays to capture user gestures and screen-streaming sessions for real-time monitoring.