Skip to content
.ca
4 minhigh

New NGate variant hides in a trojanized NFC payment app

ESET researchers identified a new variant of the NGate Android malware that trojanizes the legitimate HandyPay application to facilitate NFC relay attacks and steal payment card PINs. Targeting users in Brazil through social engineering and fake app stores, the malware allows attackers to conduct unauthorized ATM cash-outs while requiring no suspicious device permissions.

Sens:ImmediateConf:highAnalyzed:2026-04-21reports

Authors: ESET Research

ActorsNGatePhantomCard

Source:ESET

IOCs · 4

Key Takeaways

  • A new NGate variant trojanizes the legitimate HandyPay Android app to relay NFC data and steal payment card PINs.
  • Malicious code injections show signs of being AI-generated, lowering the barrier to entry for attackers.
  • The campaign targets Brazilian users via fake lottery websites (Rio de Prêmios) and fake Google Play pages (Proteção Cartão).
  • The malware requires no special Android permissions, only needing to be set as the default payment app.
  • PINs are exfiltrated in plaintext via HTTP POST requests to an attacker-controlled C2 server.

Affected Systems

  • Android OS

Attack Chain

Victims are lured via a fake lottery website or a fake Google Play page to manually download and install a trojanized version of the HandyPay app. Once installed, the app prompts the user to set it as the default payment app and asks them to enter their payment card PIN and tap their card against the device. The malware relays the NFC data to an attacker-controlled device using HandyPay's native functionality, while simultaneously exfiltrating the captured PIN to a C2 server via an HTTP POST request. The attackers then use the relayed NFC data and stolen PIN to perform unauthorized ATM withdrawals.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

The article does not provide specific detection rules (YARA, Sigma, etc.), but lists file hashes, domains, and IP addresses for IOC-based detection.

Detection Engineering Assessment

EDR Visibility: Medium — Mobile EDR/MDM solutions can detect sideloaded APKs and flag known malicious hashes, but the app requests no special permissions, making behavioral detection harder. Network Visibility: High — The malware exfiltrates PINs in plaintext via HTTP POST requests to a hardcoded IP address, which is highly visible in network traffic. Detection Difficulty: Moderate — While the network traffic is unencrypted and easy to spot, the malware relies on users manually sideloading apps, bypassing official app store protections.

Required Log Sources

  • Network flow logs
  • DNS query logs
  • Mobile Device Management (MDM) app inventory

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for unencrypted HTTP POST requests to IP addresses containing the URI path '/protecaocartao/painel.php'.Network proxy or firewall logsExfiltrationLow
Identify Android devices communicating with the domain 'protecaocartao.online'.DNS logsInitial AccessLow

Control Gaps

  • Lack of enforcement against sideloading apps from unknown sources
  • Absence of network filtering for known malicious IPs/domains on mobile networks

Key Behavioral Indicators

  • Plaintext HTTP POST requests containing 'senha=' parameters
  • Sideloaded APKs named 'PROTECAO_CARTAO.apk' or 'Rio_de_Prêmios_Pagamento.apk'

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Block access to 108.165.230.223 and protecaocartao.online on corporate networks and MDM-managed devices.
  • Search MDM inventories for the identified malicious APK hashes or package names.

Infrastructure Hardening

  • Enforce MDM policies that prevent the installation of Android applications from unknown sources (sideloading).

User Protection

  • Ensure Google Play Protect is enabled on all corporate Android devices.

Security Awareness

  • Educate users about the risks of downloading apps from outside the official Google Play Store.
  • Warn users about social engineering tactics involving fake lottery winnings and WhatsApp messages.

MITRE ATT&CK Mapping

  • T1660 - Phishing
  • T1417.002 - Input Capture: GUI Input Capture
  • T1646 - Exfiltration Over C2 Channel

Additional IOCs

  • Ips:
    • 104[.]21[.]91[.]170 - Cloudflare IP hosting the protecaocartao.online distribution website
  • File Hashes:
    • A4F793539480677241EF312150E9C02E324C0AA2 (SHA1) - Malicious APK: PROTECAO_CARTAO.apk (Android/Spy.NGate.CB)
  • Other:
    • +55 11 94806-0390 - WhatsApp phone number used in the fake lottery social engineering lure