Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Sandworm Targets Critical OT Assets, Pivoting from
May 14, 2026
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
Home/Threats/Chinese Hackers Use NFC Android Malware to Ste Deploy NFC-enabled
Threats

Chinese Hackers Use NFC Android Malware to Ste Deploy NFC-enabled

Chinese threat actors have launched a sophisticated campaign using NFC Android Malware called Ghost Tap to intercept and steal financial information from victims worldwide. The malware operates...

Jennifer sherman
Jennifer sherman
January 7, 2026 2 Min Read
19 0

Chinese threat actors have launched a sophisticated campaign using NFC Android Malware called Ghost Tap to intercept and steal financial information from victims worldwide.

The malware operates through a deceptive distribution model, where attackers trick users into downloading seemingly legitimate applications via Telegram and other messaging platforms.

Once installed, Ghost Tap leverages Near Field Communication technology to read payment card data when victims unknowingly tap their cards against infected devices, silently capturing sensitive information without user awareness.

The attack chain relies heavily on social engineering tactics to maximize infection rates. Attackers craft convincing lures disguised as popular applications, gaming software, or utility tools to lower users’ guard and encourage downloads.

The malware then requests permission to access NFC functionality, which most users grant without understanding the security implications.

Once activated, Ghost Tap operates in the background, continuously monitoring for NFC card interactions and transmitting stolen data through remote servers controlled by the threat actors.

Group-IB Threat Intelligence researchers identified the campaign after tracking over 54 unique Ghost Tap samples circulating across multiple distribution channels.

Chinese threat actors are deploying NFC-enabled #Androidmalware known as “Ghost Tap” to remotely relay payment data from victims’ cards via Telegram-distributed apps. Using #socialengineering, victims are tricked into installing APKs and tapping their cards, enabling fraudsters… pic.twitter.com/W1HjkB5jMg

— Group-IB Threat Intelligence (@GroupIB_TI) January 7, 2026

The researchers noted that many variants impersonate legitimate applications from well-known companies, making detection more challenging for average users.

Their analysis revealed that fraudsters use the intercepted payment data to conduct unauthorized transactions through illicit point-of-sale terminals, with victims reporting financial losses across multiple countries.

Persistence mechanism

The malware’s persistence mechanism represents a particularly concerning technical aspect of this threat. Ghost Tap employs advanced evasion techniques to maintain its presence on infected devices even after users attempt to uninstall applications.

The malware registers itself as a system service and hooks into Android’s NFC framework at a deep level, allowing it to operate independently from the parent application.

Work flow (Source - X)
Work flow (Source – X)

When a user attempts deletion, Ghost Tap automatically reinstalls itself by leveraging compromised system processes, making removal extremely difficult without technical expertise or specialized security tools.

Security researchers recommend users exercise extreme caution when installing applications from untrusted sources and verify app authenticity through official application stores only.

Disabling NFC functionality when not in use provides additional protection against these attacks.

Organizations should implement mobile device management solutions to monitor and block suspicious applications, while users must remain vigilant about granting permissions to installed software.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Threat Actors Use Google Cloud to Steal Microsoft Leversges Services

Next Post

Stolen Data Manipulated to Corrupt AI Models, Researchers Generate

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Anthropic Mythos AI Finds macOS Flaws B Anthropic’s Reportedly
May 14, 2026
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us