Cyber crooks are abusing a trojanized Android cost utility to steal close to area communication (NFC) information and PINs, enabling cloning of cost playing cards and draining sufferer accounts.
In line with ESET researchers, a brand new variant of the NGate malware has been infused into the HandyPay NFC-relay utility to switch NFC information to the attacker’s system and use it for contactless ATM cash-outs.
Use of AI is suspected within the marketing campaign. “To trojanize HandyPay, menace actors likely used GenAI, indicated by emoji left within the logs which can be typical of AI-generated textual content,“ the researchers mentioned in a weblog publish.
The marketing campaign has been distributing two malware samples, by a faux lottery web site and a faux Google Play web site, in assaults concentrating on Android customers in Brazil since November 2025.
Legit app doing the soiled work
ESET researchers identified that the marketing campaign marks NGate operators shifting from customized tooling to a trojanized legit utility. HandyPay, initially designed to relay NFC information between gadgets, is getting used to require minimal permissions and mix into anticipated cost workflows.
This method avoids constructing customized tooling from scratch, beforehand seen with the NFCGate abuse, and as a substitute provides malicious code into an current NFC-capable app. By repurposing an NFC relay app, the attackers inherit performance that already handles the core information trade, the researchers famous.
An NFC-relay app is a device that captures contactless communication from a card or system and forwards it in actual time to a different system, extending the short-range Close to Area Communication sign over a community for distant use.
As a result of the app operates inside anticipated NFC workflows, it’s simpler for attackers to masks the assault.
The distribution channels embrace a faux lottery website impersonating Brazil’s “Rio de Premios,” and a spoofed Google Play web page promoting a “card safety” device.
AI was seemingly used
ESET researchers additionally noticed one thing uncommon within the malware’s internals. Some traces advised generative AI might have performed a job in its improvement.
Particularly, the injected malicious code accommodates emoji markers in debug logs, one thing extra generally related to AI-generated output than human-written malware. The researchers famous that this isn’t definitive proof however aligns with a broader development of attackers utilizing massive language fashions to speed up malware creation.
Android presently has some safety towards this assault vector within the type of security alerts. “The sufferer must manually set up a trojanized model of HandyPay, for the reason that app is simply obtainable outdoors Google Play,” the researchers mentioned. “When a person faucets the obtain app button of their browser, Android robotically blocks the set up and reveals a immediate asking them to permit set up from this supply.”
For the assault to achieve success, the person then must faucet Settings within the immediate, allow “Enable from this supply,” and return to putting in the app, a course of fairly frequent with third-party app set up nowadays. Nothing notably suspicious stands out within the “permit obtain” workflow to guard towards this menace.
ESET shared a listing of indicators in a devoted GitHub repository, which included recordsdata, hashes, community indicators, and MITRE ATT&CK maps to assist detection efforts.



