Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

News Flash

SuperCard X: the invisible malware that empties your NFC cards remotely

A new high-tech attack threatens contactless payments without you noticing

SuperCard X

Table of contents

  • The new threat is called SuperCard X
  • How the NFC relay attack works
  • What makes SuperCard X dangerous
  • SuperCard X makes NFC relay attacks a real-world danger

The new threat is called SuperCard X

SuperCard X is the new Malware-as-a-Service (MaaS) platform discovered by Cleafy Labs, representing a growing danger for NFC payments.

Created by Chinese-speaking cybercriminal groups, this malware can intercept and retransmit NFC communications between a payment card and a POS or ATM, enabling remote fraudulent transactions without the need for the physical card.

How the NFC relay attack works

The SuperCard X malware operates stealthily, exploiting Near Field Communication to capture contactless card data through an infected smartphone. Once acquired, the data is sent to a remote device, which uses it to perform instant, unauthorized transactions.

Attackers use social engineering techniques like smishing and fake telephone support calls (TOAD) to trick victims into installing malicious apps. During the call, users are convinced to bring their NFC card close to their phone, allowing the malware to capture and transmit sensitive information.

What makes SuperCard X dangerous

Among the key features identified by Cleafy Labs, SuperCard X stands out for:

  • Low detection profile
    Hard to detect by antivirus solutions.
  • Similarity to NGate
    Probable evolution of known malware.
  • Wide spread
    Promoted on Telegram with direct affiliate support.

The malware uses two apps: a Reader to capture NFC data and a Tapper to emulate the card at POS or ATMs. Communications between the apps are protected via Mutual TLS (mTLS), ensuring high-level protection against forensic analysis and interception.

SuperCard X makes NFC relay attacks a real-world danger

Experts emphasize that NFC relay attacks are no longer a theoretical risk. SuperCard X has proven these scenarios are now operational, with cases already identified in Italy.

Banks, card issuers, and end users must increase their vigilance, implementing real-time detection systems and advanced security measures.

To top