This method enables criminal syndicates to use stolen card details linked to contactless wallets, facilitating in-person purchases of high-value goods through mules and laundering proceeds via global Telegram-based marketplaces.
The core mechanism involves cybercriminals extracting payment card credentials through phishing campaigns and sophisticated malware. Once obtained, credentials are loaded onto mobile wallets on burner phones, often using automated software capable of relaying NFC signals.
Notably, tools like NFCGate and proprietary platforms (e.g., “SuperCard X”) allow attackers to transmit tokenized card data in real time to devices controlled by their syndicates.
With these capabilities, mules recruited by these groups can execute tap-to-pay transactions at retail stores, frequently escaping detection due to gaps in Know-Your-Customer (KYC) protocols and the use of fake identity documents.
The ghost-tapping ecosystem is highly structured, comprising several specialized roles:
Case studies, such as those reported by Singaporean authorities, illustrate ghost-tapping’s global reach. Between October and December 2024, over 650 incidents resulted in at least SGD 1.2 million in losses, with the majority involving compromised cards linked to Apple Pay.
Common targets include mobile phones, jewelry, and gold, purchased by foreign nationals who enter countries pretending to be tourists.
Financial institutions and payment providers are advised to strengthen link authentication measures, limit SMS-based OTP reliance, and incorporate risk analysis for device provisioning attempts.
Machine learning models that flag relayed payments and suspect device behaviors can help stem this threat. For consumers, awareness and prompt reporting of unauthorized activity are vital safeguards.
Experts now warn that ghost-tapping is poised to expand globally, with criminal tooling and infrastructure evolving to target new regions and payment ecosystems.
The challenge for law enforcement and the financial industry is to keep pace with increasingly automated and decentralized fraud operations, where agile, tech-savvy threat actors persistently circumvent traditional controls.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Ghost-Tapping – The Hidden Threat Targeting Apple Pay and Google Pay Users appeared first on Cyber Security News.
If you're looking for a high-capacity power bank to extend your Nintendo Switch 2 or…
Pokémon Pokopia comes out on Thursday, and if you preorder it from Best Buy, you…
Nowadays it's quite difficult to find an RTX 5070 Ti prebuilt for under $2,000, but…
Bungie has outlined what to expect from Marathon upon launch, and confirmed plans for seasonal…
At what point during triage does your team actually feel confident enough to make a decision? For many…
Cybercriminals have unleashed Starkiller, a sophisticated “phishing-as-a-service” tool that tricks users by serving genuine login…
This website uses cookies.