Ghost Tapped Turns Android Phones Into Fraud Payment Relays

Ghost Tapped is Android malware that abuses NFC to enable remote payment fraud without physical card access.

Written By
thumbnail
Ken Underhill
Ken Underhill
Jan 9, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cybercriminals have found a new way to drain bank accounts — by turning victims’ Android phones into unwitting payment relays. 

A newly documented attack technique, Ghost Tapped, exploits NFC to enable remote financial fraud without physical access to a victim’s bank card.

“At least $355,000 in illegitimate transactions have been recorded from one POS vendor alone throughout November 2024 – August 2025,” said Group-IB researchers.

Inside the Ghost Tapped NFC Fraud Scheme

Ghost Tapped targets Android devices by abusing near field communication (NFC), the same technology used for contactless payments at stores and ATMs. 

Because the attack leverages legitimate payment workflows, fraudulent transactions can appear normal to banks and payment processors, making detection more difficult.

Advertisement

Initial Infection and Social Engineering

The attack typically begins with social engineering, such as deceptive text messages or phone calls that persuade victims to install malicious APK files disguised as legitimate banking or payment apps. 

Once installed, the app prompts users to tap their physical bank cards against their phones, claiming the action is required for verification or security enrollment.

Instead, the malicious application captures the card’s NFC payment data and sends it to an attacker-controlled command-and-control (C2) server. 

Ghost Tapped operates using a two-component architecture: a reader app on the victim’s device that collects and encrypts payment data, and a tapper app used by criminals. 

When a victim taps their card, the reader app relays the encrypted data through internet-connected servers to the tapper app in near real time.

Advertisement

Fraudulent Transactions at POS Terminals

The tapper app then transmits the payment data to real point-of-sale terminals or ATMs that have been stolen or fraudulently obtained from legitimate payment processors. 

To the terminal, the transaction appears fully legitimate — as if the attacker’s device itself were the victim’s physical bank card — allowing unauthorized payments to proceed without raising immediate suspicion.

Malware Variants and Operational Scale

Group-IB identified more than 54 variants of Ghost Tapped malware circulating between August 2024 and August 2025, with several versions actively sold and promoted through Telegram marketplaces. 

The malicious apps request Android permissions such as android.permission.NFC and android.permission.INTERNET, enabling interaction with NFC hardware and external communication.

After installation, the malware collects device identifiers and authentication data and maintains persistent connections to attacker infrastructure using WebSocket or MQTT protocols. 

Between November 2024 and August 2025, one threat group associated with Ghost Tapped processed at least $355,000 in fraudulent transactions, with thousands of victims reported globally.

Law enforcement agencies have already made arrests related to Ghost Tapped activity in multiple countries, including the United States, Singapore, the Czech Republic, and Malaysia, highlighting both the scale and the international reach of the operation.

Advertisement

How to Reduce NFC Fraud Risk

Organizations can reduce the risk of NFC-based fraud by combining technical controls with user awareness and operational readiness.

  • Restrict installation of untrusted applications and enforce mobile device management controls to limit sideloading and unauthorized app behavior.
  • Disable or tightly restrict NFC functionality on devices where contactless payments are not required.
  • Educate users to treat unsolicited requests to tap payment cards or install apps as suspicious and report them promptly.
  • Strengthen transaction monitoring with behavioral analytics, velocity checks, and step-up authentication for high-risk NFC payments.
  • Apply least-privilege permissions, OS hardening, and mobile threat detection to prevent abuse of NFC and network capabilities.
  • Review, test, and update incident response plans.

These steps help build resilience against attacks like Ghost Tapped and reduce blast radius.

Advertisement

When Digital Attacks Meet Physical Payments

Ghost Tapped illustrates a broader shift in cybercrime toward attacks that bridge digital systems and real-world financial infrastructure. 

Instead of relying solely on traditional software vulnerabilities, attackers are exploiting trusted, everyday technologies such as smartphones and contactless payment mechanisms. 

This approach allows fraudulent activity to blend in with legitimate transactions, making detection and prevention more challenging for both organizations and financial institutions. 

In response, organizations are adopting zero-trust solutions to reduce implicit trust and protect high-risk payment and mobile environments.

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.