Chinese cybercriminals using advanced tools to carry out NFC fraud at scale

Chinese cybercriminals using advanced tools to carry out NFC fraud at scale

Cyber threat intelligence analysts at Resecurity warn of an uptick in Near Field Communication (NFC)-related fraud, with recent investigations pointing to highly adaptable Chinese cybercriminals exploiting contactless payment technologies on a global scale.

According to Resecurity, a growing number of banks, FinTech firms, and credit unions have reported sophisticated fraud operations leveraging NFC against ATMs and point-of-sale (POS) terminals.

Chinese-speaking cybercriminal groups, many of which are believed to be connected to state-sponsored or state-tolerated syndicates, are using advanced tools to carry out fraud at scale. These operations often involve "device farms" — clusters of Android phones configured with NFC-enabled cards — to automate illicit transactions.

The fraud scheme relies on the use of Host Card Emulation (HCE), a feature on Android that allows a smartphone to emulate a contactless smart card. By registering a service that extends the HostApduService class, malicious apps can respond to Application Protocol Data Unit (APDU) commands, which are the standard form of communication between NFC card readers and smart cards. This capability enables the phone to behave like a real NFC payment card during point-of-sale transactions, effectively fooling terminals into processing unauthorized payments.

Apps such as Mycard, Airpay, and Track2NFC — originally designed for secure and legitimate NFC card emulation — are being manipulated to commit fraud. Cybercriminals have also developed their own software tools, like Z-NFC and King NFC, which are sold via Telegram channels under subscription models. The tools allow attackers to emulate smart card transactions using Android phones and make fraudulent purchases undetected. Z-NFC provides not only the software package but also ongoing technical support and tutorials to assist buyers in executing fraud effectively. King NFC, previously marketed on the Dark Web, has a similar functionality.

Resecurity reports that affected regions include the United States, United Kingdom, European Union, Australia, Canada, Japan, and several others across Asia and the Middle East. Victims range from everyday consumers to major banking institutions. Notably, financial services such as Barclays, Revolut, HSBC, and WISE have been explicitly targeted.

The Resecurity findings come following Cleafy Threat Intelligence team’s report about a new and highly sophisticated Android malware campaign dubbed ‘SuperCard X’, which is leveraging an advanced NFC-relay attack to authorize fraudulent transactions at Point-of-Sale (POS) terminals and Automated Teller Machines (ATMs).

Back to the list

Latest Posts

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

LOSTKEYS is designed to steal sensitive files, harvest system information, and exfiltrate details about running processes.
8 May 2025
Russia-aligned operation manipulates audio and images to impersonate experts

Russia-aligned operation manipulates audio and images to impersonate experts

The operation primarily focused on undermining NATO support for Ukraine and spreading false narratives to disrupt domestic politics in EU member states.
7 May 2025
Global network of DDoS-for-hire services dismantled in international police op

Global network of DDoS-for-hire services dismantled in international police op

The suspects are believed to have administered six now-defunct websites, which operated as stresser or booter services.
7 May 2025