Hackers Use ‘Ghost-Tap’ to Steal Cards from Mobile Wallets

Hackers Use ‘Ghost-Tap’ to Steal Cards from Mobile Wallets

What Is Ghost-Tap?

“Ghost‑Tap,” also known as NFC relay fraud, is a sophisticated cyber‑fraud technique where attackers hijack payment card credentials and use them remotely for contactless transactions—without having your physical card or phone in hand. They use Near‑Field Communication (NFC) relay technology to transmit stolen credentials to in‑store payment terminals.

This method lets criminals essentially turn your card into a phantom tap, letting them buy items or make ATM withdrawals globally using your stolen data.

How It Works

  1. The Steal
    Fraudsters use phishing, mobile malware, smishing (SMS scams), or overlay attacks to capture your card details and one‑time passwords (OTPs).

  2. The Load
    Using the stolen data, they link the card to mobile wallets like Apple Pay or Google Pay—often by tricking victims into supplying their OTP.

  3. Setting Up the Relay
    Tools like NFCGate allow attackers to relay NFC signals from a wallet‑laden device to another phone, often via a server, enabling remote tap‑to‑pay transactions.

  4. The Cash‑Out
    These credentials are sold or rented on Telegram channels (e.g., Huione, Xinbi, Tudou Guarantee). Syndicates recruit money mules—often portrayed as tourists—to make purchases (e.g., electronics, luxury goods, gift cards) or conduct ATM withdrawals using the ghost‑tap technique.

  5. Scaling the Fraud
    This fraud model relies on global coordination between cybercriminals, syndicates, and payment mules, making it hard to track and shut down.

Real-World Incidents

Singapore: In late 2024, over 656 cases were recorded involving phished card credentials linked to mobile wallets—resulting in approx. $1.2 million in losses. Many involved foreign mules buying luxury goods.

United States (Knox County, Tennessee): Over 10 individuals were arrested for large-scale fraud involving loading stolen credit cards into digital wallets and buying gift cards that were then resold online.

Australia: A victim, Ian Williams, discovered unauthorized purchases made using ghost‑tap, leading to ongoing legal action.

UK & North America: Experts warn of widespread scams that prompt OTPs for wallet enrollment rather than purchases, allowing fraudsters to transfer cards into their own wallets—then waiting months to spend undetected on gift cards and other items.

Emerging Trends & Detection Techniques

Advanced Attack Evolution
Ghost‑tap is surging globally, with specially crafted relay tools and automation enabling mass fraud.

Fraud Detection Innovations
Solutions like Flagright use real‑time metadata analysis—checking device IDs, geographic inconsistencies, transaction timing, and NFC entry mode—to detect anomalies that may signal ghost‑tap attacks.

How to Protect Yourself

For Consumers:

  • Never share OTPs—especially via text links. These may be used to enroll your card into a fraudster’s mobile wallet.

  • Use virtual cards for online payments, and top them up as needed. Avoid using cards tied to digital wallets for general use.

  • Disable contactless and ATM payments via mobile wallets when not needed. Use PIN-authenticated plastic cards instead.

  • Monitor bank notifications—real-time alerts help catch suspicious transactions early.

For Banks & Retailers:

  • Implement real-time transaction monitoring based on metadata—device familiarity, IP location, entry mode, and redemption patterns.
  • Set velocity rules—flag rapid repeated NFC taps at small merchants that are unusual.
  • Enforce KYC measures in retail purchases, especially where digital wallets are used.
  • Track mule networks across messaging platforms like Telegram and cooperate with law enforcement to disrupt fraud chains.
  • Looking Ahead: A Global Call to Action

Ghost-tap represents a fast-moving, highly scalable global threat, turning stolen credentials into cash or goods through cross-border relay and mule networks. As digital wallets grow in popularity, so do the opportunities for misuse.

Consumers, banks, and regulators must stay alert and act swiftly—leveraging technology, real-time threat intel, and education—to outpace fraudsters.