Article 6Q6VQ Android malware steals payment card data using previously unseen technique

Android malware steals payment card data using previously unseen technique

by
Dan Goodin
from Ars Technica - All content on (#6Q6VQ)
atm-bank-800x533.jpg

Enlarge (credit: d3sign)

Newly discovered Android malware steals payment card data using an infected device's NFC reader and relays it to attackers, a novel technique that effectively clones the card so it can be used at ATMs or point-of-sale terminals, security firm ESET said.

ESET researchers have named the malware NGate because it incorporates NFCGate, an open source tool for capturing, analyzing, or altering NFC traffic. Short for Near-Field Communication, NFC is a protocol that allows two devices to wirelessly communicate over short distances.

New Android attack scenario

This is a new Android attack scenario, and it is the first time we have seen Android malware with this capability being used in the wild," ESET researcher Lukas Stefanko said in a video demonstrating the discovery. NGate malware can relay NFC data from a victim's card through a compromised device to an attacker's smartphone, which is then able to emulate the card and withdraw money from an ATM."

Read 8 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments