Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Claude Code RCE Flaw: Execute Commands Lets Attackers
May 18, 2026
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
Home/Threats/NGate Malware Uses AI to Hide in NFC Payment Apps Developed Using
Threats

NGate Malware Uses AI to Hide in NFC Payment Apps Developed Using

Security researchers have identified a more potent variant of the NGate malware, distinguishing itself through its AI-driven development. This sophisticated threat is designed to conceal itself...

David kimber
David kimber
April 21, 2026 4 Min Read
6 0

Security researchers have identified a more potent variant of the NGate malware, distinguishing itself through its AI-driven development. This sophisticated threat is designed to conceal itself within trojanized Near-Field Communication (NFC) payment applications, posing a significant risk to mobile users. A comprehensive report details its advanced capabilities and stealth mechanisms, outlining how it hides within these apps to evade detection

This time, threat actors appear to have used artificial intelligence to help write the malicious code, which marks a significant shift in how cybercriminals are building attack tools today.

The malware targets Android users by disguising itself as a legitimate app called HandyPay. HandyPay is a real Android application available on Google Play since 2021, designed to relay NFC data between two devices for everyday uses like card sharing.

Attackers took this app, quietly patched it with harmful code, and began distributing it outside the official Google Play Store.

Once installed on a victim’s phone, the trojanized version silently reads payment card data via NFC and forwards it to an attacker-controlled device.

The attacker can then use that stolen card data to make contactless ATM withdrawals and unauthorized payments.

In addition to stealing NFC data, the malware can also capture the victim’s payment card PIN and send it to the attackers’ command-and-control (C2) server over HTTP.

WeLiveSecurity analysts and researchers identified this new NGate variant and noted that the malicious code showed clear signs of AI generation, including emojis left in log entries that are typical of text produced by large language models.

The campaign has been running since November 2025 and continues to actively target Android users in Brazil.

The attacks are carried out through two separate distribution channels. The first uses a fake lottery website that impersonates a Brazilian state lottery organization called Rio de Premios.

The site shows a rigged scratch card game where the user always wins R$20,000 and is then directed to send a WhatsApp message to claim the prize, after which they are guided to download the trojanized app.

The second channel is a fake Google Play page distributing the malware under the name Protecao Cartao, meaning Card Protection in English.

Geographical distribution of NGate attacks from January 2025 to February 2026 (Source - Welivesecurity)
Geographical distribution of NGate attacks from January 2025 to February 2026 (Source – Welivesecurity)

Both websites were hosted on the same domain, strongly indicating a single threat actor behind the entire operation.

How the Trojanized App Works

Once a user installs the fake HandyPay app, the infection process begins with a simple but effective setup. The app asks to be set as the default NFC payment application on the device.

This request does not look suspicious because it is part of the original HandyPay functionality. The app also asks the victim to enter their payment card PIN and then tap their physical card to the back of their phone.

At that point, the malware reads the NFC card data and forwards it through the HandyPay relay service to the attacker’s device, which is linked to a hardcoded email address inside the malicious app.

Trojanized HandyPay operational flow (Source - Welivesecurity)
Trojanized HandyPay operational flow (Source – Welivesecurity)

What makes this variant especially dangerous is that no special permissions are needed on the victim’s device to relay NFC data.

The malicious app only requires being set as the default payment app, keeping the attack well below the radar of standard permission-based security checks.

Example of PIN exfiltration to the C2 server over HTTP (Source - Welivesecurity)
Example of PIN exfiltration to the C2 server over HTTP (Source – Welivesecurity)

The card PIN is exfiltrated separately to the C2 server, giving attackers everything needed to perform both contactless payments and ATM cash-outs.

Users should only download payment apps directly from official sources like the Google Play Store and avoid installing apps from third-party websites or links shared over messaging apps.

Enabling Google Play Protect on Android devices provides added protection, as it automatically detects known versions of this malware.

Users should never enter their payment card PIN into a newly installed or unfamiliar app, especially one claiming to be a prize or card protection tool.

If a payment app requests NFC access without coming from a trusted source, uninstall it immediately and report the incident to the relevant bank or card issuer.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

GitHub Phishing: Malicious OAuth Apps Target Developers

Next Post

New PureRAT Campaign Hides PE Payloads in PNG Files and Executes

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us