Vulnerabilities

๐Ÿšจ ๐†๐‡๐Ž๐’๐“ ๐“๐€๐: ๐“๐‡๐„ ๐‚๐Ž๐๐“๐€๐‚๐“๐‹๐„๐’๐’ ๐’๐‚๐€๐Œ ๐“๐‡๐€๐“ ๐…๐‹๐ˆ๐„๐’ ๐”๐๐ƒ๐„๐‘ ๐“๐‡๐„ ๐‘๐€๐ƒ๐€๐‘! ๐Ÿšจ

photo of ๐Ÿšจ ๐†๐‡๐Ž๐’๐“ ๐“๐€๐: ๐“๐‡๐„ ๐‚๐Ž๐๐“๐€๐‚๐“๐‹๐„๐’๐’ ๐’๐‚๐€๐Œ ๐“๐‡๐€๐“ ๐…๐‹๐ˆ๐„๐’ ๐”๐๐ƒ๐„๐‘ ๐“๐‡๐„ ๐‘๐€๐ƒ๐€๐‘! ๐Ÿšจ


๐Ÿ’ณ Contactless payment has made our lives easier, but did you know hackers exploit it to steal your money? Hereโ€™s how the Ghost Tap technique works and how to protect yourself.


โ“ ๐–๐‡๐€๐“ ๐ˆ๐’ ๐†๐‡๐Ž๐’๐“ ๐“๐€๐?

Hackers use a mix of technologies to carry out fraudulent contactless payments without your knowledge. Hereโ€™s the technical breakdown:


1๏ธโƒฃ Bank data theft:

๐Ÿ“ฉ Using phishing emails or malware, hackers steal your banking info or card details.


2๏ธโƒฃ Virtual card cloning:

They use this data to create a virtual card, which they load onto a smartphone or NFC (Near Field Communication) device.


3๏ธโƒฃ Remote payments:

โ†’Accomplices use the virtual card on their phone in airplane mode, making it untraceable.

โ†’They make small payments in physical stores, usually below the contactless payment limit (โ‚ฌ50 or โ‚ฌ100 depending on the region).


4๏ธโƒฃ Evading detection systems:

โ†ณ Low-value transactions mimic your typical purchases, making them undetectable by banks.


๐“๐‡๐„ ๐“๐„๐‚๐‡๐๐Ž๐‹๐Ž๐†๐˜ ๐๐„๐‡๐ˆ๐๐ƒ ๐†๐‡๐Ž๐’๐“ ๐“๐€๐

โ†ณ NFC (Near Field Communication): The key enabler of this scam, as it allows wireless payments.


๐‡๐š๐œ๐ค๐ž๐ซ๐ฌ ๐ž๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ:

โžก๏ธThe proximity requirement for payments (just a few centimeters), but with a virtual card.

โžก๏ธAirplane mode: No network connection means fewer traces for banks or mobile operators.


The following picture shows the scheme of interactions:

MTI_NFC_relay_flow



๐Ÿ› ๏ธ ๐’๐ญ๐ž๐š๐ฅ๐ญ๐ก๐ฒ ๐Ÿ๐ซ๐š๐ฎ๐:

โ›”๏ธPayments are designed to appear normal: small amounts, spread out over time.

โ›”๏ธPayment terminals donโ€™t always verify identities, making it easier for hackers to succeed.


โš ๏ธ ๐–๐‡๐˜ ๐ˆ๐’ ๐“๐‡๐ˆ๐’ ๐€ ๐๐ˆ๐† ๐ƒ๐„๐€๐‹?

โ†’ Current banking security measures arenโ€™t always fast or robust enough to detect this kind of fraud.

โ†’ Hackers can operate internationally, with stolen data often sold on the dark web.


๐Ÿ’ก ๐‡๐Ž๐– ๐“๐Ž ๐๐‘๐Ž๐“๐„๐‚๐“ ๐˜๐Ž๐”๐‘๐’๐„๐‹๐…

1๏ธโƒฃ Regularly check your accounts: Small, unusual transactions can be red flags.

2๏ธโƒฃ Enable real-time notifications for every transaction.

3๏ธโƒฃ Disable NFC services on your card if youโ€™re not using them.

4๏ธโƒฃ Report any suspicious activity to your bank immediately.