New Ghost Tap Attack: The Next-Level Credit Card Scam Exploiting Apple Pay and Google Pay | Black Hat Ethical Hacking



Cybercriminals have devised a sophisticated scheme, dubbed ‘Ghost Tap,’ to exploit stolen credit card details linked to mobile payment systems like Apple Pay and Google Pay. This method leverages Near Field Communication (NFC) relays to enable global money mules to perform fraudulent transactions at Point-of-Sale (PoS) terminals.

Unlike previous attacks using the NGate malware, Ghost Tap eliminates the need for the victim’s device or continued interaction, making detection more challenging. Security firm Threat Fabric warns of a recent surge in Ghost Tap activity, with attackers coordinating large-scale fraudulent purchases.

Threat actors looking for money mules on cybercrime forum
Source: Threat Fabric

How Ghost Tap Works

  1. Data Theft: Attackers steal card details and intercept one-time passwords (OTPs) through phishing, malware, or social engineering.
  2. Relay Mechanism: A relay server transmits the stolen payment credentials to a global network of money mules.
  3. Mule Operations: Mules use NFC-enabled devices to conduct PoS transactions, spreading activities across multiple locations to avoid detection.

This tactic contrasts with NGate attacks, where criminals relied on malware to guide victims into scanning their own NFC cards. Ghost Tap’s obfuscation methods make it harder to trace the fraud to its operators, leaving mules to face potential legal risks

Overview of the Ghost Tap tacticOverview of the Ghost Tap tactic
​​​​Source: Threat Fabric


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *