PrimePay Networks

How Bad Actors Add Stolen Cards to Digital Wallets Via Ghost-Tapping

ghost-tapping fraud

China has been at the forefront of mobile payment adoption, but this progress has also opened the door to new attack vectors for cybercriminals.

Traditionally, stealing card data has been the central objectives of fraud schemes such as phishing and malware attacks. Now, however, a technique known as ghost-tapping allows criminals to use stolen credentials for in-store purchases.

Once they obtain card data, they can add it to digital wallets like Apple Pay or Google Pay by intercepting the one-time authentication codes sent by these platforms. Using burner phones, they then make payments to retailers or even withdraw cash from compatible ATMs.

According to researchers from Recorded Future’s Insikt Group found, this trend originated in Southeast Asia and spread quickly across the region. But ghost-tapping could prove equally effective anywhere contactless digital wallet payments are accepted.

An Organized Network

Perhaps more concerning than the specifics of the fraud vector is the substantial infrastructure that supports it. Insikt Group identified organized networks that disseminate both the phones and the phishing software used in ghost-tapping fraud.

It also means that once a criminal makes a fraudulent purchase, they have a network to turn to for selling their ill-gotten goods. Many of these networks had been using the Telegram messaging platform until the company strengthened its security measures last year.

However, the report noted that this only pushed bad actors to shift to other platforms, and that the substantial volume of advertisements and recruitment messages there indicates a burgeoning market for goods obtained through ghost-tapping.

Future Fraudulent Use

These networks represent a growing trend in fraud: the emergence of cybercrime-as-a-service. Such syndicates provide the technology and software used for malware or ransomware attacks to other parties—for a fee.

These groups can increase the scale at which fraud attacks occur, while simultaneously making it harder for authorities to pinpoint the bad actors. Additionally, they lower the barriers to entry for criminals. Insikt Group noted that syndicates would often recycle burner phones and send them back to criminals for future fraudulent use.

The post How Bad Actors Add Stolen Cards to Digital Wallets Via Ghost-Tapping appeared first on PaymentsJournal.

Facebook
LinkedIn
Pinterest
Reddit
StumbleUpon
Digg
Twitter
Tumblr
The Local Luminary
The Local Luminary

The Local Luminary is your dedicated guide to uncovering the stories, strategies, and successes of standout local businesses. With a passion for community growth and a knack for highlighting what makes businesses thrive, The Local Luminary connects you with actionable insights to boost your own business visibility and growth.

All Posts
The Local Luminary
The Local Luminary

The Local Luminary is your dedicated guide to uncovering the stories, strategies, and successes of standout local businesses. With a passion for community growth and a knack for highlighting what makes businesses thrive, The Local Luminary connects you with actionable insights to boost your own business visibility and growth.

All Posts
Search
Categories
Boost Your Business with Free Local Marketing Tools!

Looking to unlock the secrets to dominating local searches and boosting your business? Get instant access to free tools that drive results:

~ SEO – A step-by-step SEO Fix-It E-book to rank higher on Google.

~ Podcast – A custom podcast showcasing your unique growth potential. Yes, its real and its free!

~ Social Media – An E-book packed with ideas and checklists.

Click the button below to grab your free resources and discover how to rank #1 in your local market. Don’t miss out—your business’s transformation starts here!

Social Media

HAVE ANY QUESTION?