Wednesday , June 25 2025
NGate
Screens that ask the victim to place their bank card on the back of their smartphone | Source: Doctor Web

New NGate Trojan Drains Bank Accounts via ATMs

Malware analysts at Doctor Web have identified new versions of the NGate banking trojan. This malware steals data from the device’s NFC chip, enabling attackers to withdraw money from victims’ accounts at ATMs without their knowledge.

The NGate banker was first noticed by antivirus vendors in autumn 2023 due to attacks on major Czech banks. The attackers used social engineering, phishing, and malware to gain remote access to victims’ payment NFC capabilities. While Czech law enforcement managed to halt this campaign, the method was later adapted for illegal use in Russia.

WhatsApp banned on all US House of Representatives devices

The U.S. House of Representatives has banned congressional staff from using WhatsApp on government devices due to security concerns, as...
Read More
WhatsApp banned on all US House of Representatives devices

Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

Kaspersky found a new mobile malware dubbed SparkKitty in Google Play and Apple App Store apps, targeting Android and iOS....
Read More
Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

OWASP has released its AI Testing Guide, a framework to help organizations find and fix vulnerabilities specific to AI systems....
Read More
OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

Axentec Launches Bangladesh’s First Locally Hosted Tier-4 Cloud Platform

In a major milestone for the country’s digital infrastructure, Axentec PLC has officially launched Axentec Cloud, Bangladesh’s first Tier-4 cloud...
Read More
Axentec Launches Bangladesh’s First Locally Hosted Tier-4 Cloud Platform

Hackers Bypass Gmail MFA With App-Specific Password Reuse

A hacking group reportedly linked to Russian government has been discovered using a new phishing method that bypasses two-factor authentication...
Read More
Hackers Bypass Gmail MFA With App-Specific Password Reuse

Russia detects first SuperCard malware attacks via NFC

Russian cybersecurity experts discovered the first local data theft attacks using a modified version of legitimate near field communication (NFC)...
Read More
Russia detects first SuperCard malware attacks via NFC

Income Property Investments exposes 170,000+ Individuals record

Cybersecurity researcher Jeremiah Fowler discovered an unsecured database with 170,360 records belonging to a real estate company. It contained personal...
Read More
Income Property Investments exposes 170,000+ Individuals record

ALERT (CVE: 2023-28771)
Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

GreyNoise found attempts to exploit CVE-2023-28771, a vulnerability in Zyxel's IKE affecting UDP port 500. The attack centers around CVE-2023-28771,...
Read More
ALERT (CVE: 2023-28771)  Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

CISA Flags Active Exploits in Apple iOS and TP-Link Routers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included two high-risk vulnerabilities in its Known Exploited Vulnerabilities (KEV)...
Read More
CISA Flags Active Exploits in Apple iOS and TP-Link Routers

10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

SafetyDetectives’ Cybersecurity Team discovered a public post on a clear web forum in which a threat actor claimed to have...
Read More
10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

Fraudsters often start their attack with a phone call, claiming the victim is eligible for social benefits or financial gain. To receive it, the victim is instructed to click a link that leads to a fake website. This site hosts a malicious APK disguised as an app for the Gosuslugi portal, the Bank of Russia, or other popular banks, containing the NGate trojan.

The NGate banking trojan is a malicious version of the open-source NFCGate app, originally designed for debugging NFC data transfers. Attackers exploit its ability to capture NFC traffic and send it to a remote device, like a server or their own phone. They’ve altered the code to include a user interface resembling official apps and activated NFC data relay. Additionally, the app incorporates the nfc-card-reader library, allowing hackers to remotely access card numbers and expiry dates.

Once the user opens the fake application, they are asked to place their payment card on the back of the smartphone, enter their PIN, and wait for verification. During this process, all card information is collected and sent to the criminals. No rooting of the smartphone is required to access NFC data.

The attacker can steal a victim’s bank card information by holding their smartphone near the victim’s card while requesting cash from an ATM or making a contactless payment. The hacker taps their phone to transmit the victim’s card details, using the PIN the victim previously entered to confirm the transaction.

To prevent money theft, “Doctor Web” analysts recommend:

do not share your PIN or CVV codes for your bank cards,
use an antivirus program, it will block downloading and installation of malicious applications,
carefully check the addresses of web pages that ask for financial information,
only install applications from official sources such as AppGallery and Google Play,
do not talk to scammers. If you receive an unexpected call from the police, a bank or any other organization, simply hang up. If you have any doubts about the legitimacy of the call, find the contact details on the official website and contact the organization yourself.

Check Also

CYFIRMA

FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CYFIRMA analysis reveals a sophisticated malware campaign that exploits a major Indian bank’s brand through …

Leave a Reply

Your email address will not be published. Required fields are marked *