Friday , May 9 2025
NGate
Screens that ask the victim to place their bank card on the back of their smartphone | Source: Doctor Web

New NGate Trojan Drains Bank Accounts via ATMs

Malware analysts at Doctor Web have identified new versions of the NGate banking trojan. This malware steals data from the device’s NFC chip, enabling attackers to withdraw money from victims’ accounts at ATMs without their knowledge.

The NGate banker was first noticed by antivirus vendors in autumn 2023 due to attacks on major Czech banks. The attackers used social engineering, phishing, and malware to gain remote access to victims’ payment NFC capabilities. While Czech law enforcement managed to halt this campaign, the method was later adapted for illegal use in Russia.

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

Fraudsters often start their attack with a phone call, claiming the victim is eligible for social benefits or financial gain. To receive it, the victim is instructed to click a link that leads to a fake website. This site hosts a malicious APK disguised as an app for the Gosuslugi portal, the Bank of Russia, or other popular banks, containing the NGate trojan.

The NGate banking trojan is a malicious version of the open-source NFCGate app, originally designed for debugging NFC data transfers. Attackers exploit its ability to capture NFC traffic and send it to a remote device, like a server or their own phone. They’ve altered the code to include a user interface resembling official apps and activated NFC data relay. Additionally, the app incorporates the nfc-card-reader library, allowing hackers to remotely access card numbers and expiry dates.

Once the user opens the fake application, they are asked to place their payment card on the back of the smartphone, enter their PIN, and wait for verification. During this process, all card information is collected and sent to the criminals. No rooting of the smartphone is required to access NFC data.

The attacker can steal a victim’s bank card information by holding their smartphone near the victim’s card while requesting cash from an ATM or making a contactless payment. The hacker taps their phone to transmit the victim’s card details, using the PIN the victim previously entered to confirm the transaction.

To prevent money theft, “Doctor Web” analysts recommend:

do not share your PIN or CVV codes for your bank cards,
use an antivirus program, it will block downloading and installation of malicious applications,
carefully check the addresses of web pages that ask for financial information,
only install applications from official sources such as AppGallery and Google Play,
do not talk to scammers. If you receive an unexpected call from the police, a bank or any other organization, simply hang up. If you have any doubts about the legitimacy of the call, find the contact details on the official website and contact the organization yourself.

Check Also

DroidBot

New DroidBot malware to attack 77 banks and CES globally

DroidBot is a sophisticated Android Remote Access Trojan (RAT) that merges traditional hidden VNC and …

Leave a Reply

Your email address will not be published. Required fields are marked *