NGate Malware Uses AI to Hide in NFC Payment Apps Developed Using
Security researchers have identified a more potent variant of the NGate malware, distinguishing itself through its AI-driven development. This sophisticated threat is designed to conceal itself...
Security researchers have identified a more potent variant of the NGate malware, distinguishing itself through its AI-driven development. This sophisticated threat is designed to conceal itself within trojanized Near-Field Communication (NFC) payment applications, posing a significant risk to mobile users. A comprehensive report details its advanced capabilities and stealth mechanisms, outlining how it hides within these apps to evade detection
This time, threat actors appear to have used artificial intelligence to help write the malicious code, which marks a significant shift in how cybercriminals are building attack tools today.
The malware targets Android users by disguising itself as a legitimate app called HandyPay. HandyPay is a real Android application available on Google Play since 2021, designed to relay NFC data between two devices for everyday uses like card sharing.
Attackers took this app, quietly patched it with harmful code, and began distributing it outside the official Google Play Store.
Once installed on a victim’s phone, the trojanized version silently reads payment card data via NFC and forwards it to an attacker-controlled device.
The attacker can then use that stolen card data to make contactless ATM withdrawals and unauthorized payments.
In addition to stealing NFC data, the malware can also capture the victim’s payment card PIN and send it to the attackers’ command-and-control (C2) server over HTTP.
WeLiveSecurity analysts and researchers identified this new NGate variant and noted that the malicious code showed clear signs of AI generation, including emojis left in log entries that are typical of text produced by large language models.
The campaign has been running since November 2025 and continues to actively target Android users in Brazil.
The attacks are carried out through two separate distribution channels. The first uses a fake lottery website that impersonates a Brazilian state lottery organization called Rio de Premios.
The site shows a rigged scratch card game where the user always wins R$20,000 and is then directed to send a WhatsApp message to claim the prize, after which they are guided to download the trojanized app.
The second channel is a fake Google Play page distributing the malware under the name Protecao Cartao, meaning Card Protection in English.

Both websites were hosted on the same domain, strongly indicating a single threat actor behind the entire operation.
How the Trojanized App Works
Once a user installs the fake HandyPay app, the infection process begins with a simple but effective setup. The app asks to be set as the default NFC payment application on the device.
This request does not look suspicious because it is part of the original HandyPay functionality. The app also asks the victim to enter their payment card PIN and then tap their physical card to the back of their phone.
At that point, the malware reads the NFC card data and forwards it through the HandyPay relay service to the attacker’s device, which is linked to a hardcoded email address inside the malicious app.

What makes this variant especially dangerous is that no special permissions are needed on the victim’s device to relay NFC data.
The malicious app only requires being set as the default payment app, keeping the attack well below the radar of standard permission-based security checks.

The card PIN is exfiltrated separately to the C2 server, giving attackers everything needed to perform both contactless payments and ATM cash-outs.
Users should only download payment apps directly from official sources like the Google Play Store and avoid installing apps from third-party websites or links shared over messaging apps.
Enabling Google Play Protect on Android devices provides added protection, as it automatically detects known versions of this malware.
Users should never enter their payment card PIN into a newly installed or unfamiliar app, especially one claiming to be a prize or card protection tool.
If a payment app requests NFC access without coming from a trusted source, uninstall it immediately and report the incident to the relevant bank or card issuer.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.