Malware
Android
NFC

SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation

Published:
18/4/25
Download the PDF version

Download your PDF
 guide to TeaBot

Get your free copy to your inbox now

Download PDF Version

Key points

This report details a newly identified and active fraud campaign, highlighting the emergence of sophisticated mobile malware leveraging innovative techniques:

  • SuperCard X Malware: A novel Android malware offered through a Malware-as-a-Service (MaaS) model, enabling NFC relay attacks for fraudulent cash-outs.
  • Evolving Threat Landscape: Demonstrates the continuous advancement of mobile malware in the financial sector, with NFC relay representing a significant new capability.
  • Combined Attack Vectors: Employs a multi-stage approach combining social engineering (via smishing and phone calls), malicious application installation, and NFC data interception for highly effective fraud.
  • Low Detection Rate: SuperCard X currently exhibits a low detection rate among antivirus solutions due to its focused functionality and minimalistic permission model.
  • Broad Target Scope: The fraud scheme targets customers of banking institutions and card issuers, aiming to compromise payment card data.

Executive Summary

The Cleafy Threat Intelligence team has identified a new and sophisticated Android malware campaign, dubbed 'SuperCard X’. This campaign employs a novel NFC-relay technique, enabling Threat Actors (TAs) to fraudulently authorize Point-of-Sale (POS) payments and Automated Teller Machine (ATM) withdrawals by intercepting and relaying NFC communications from compromised devices. The malware is distributed through Social Engineering tactics, deceiving victims into installing the malicious application and subsequently “tapping” their payment cards on their infected phones. 

Preliminary analysis suggests that TAs are leveraging a Chinese-speaking Malware-as-a-Service (MaaS) platform promoted as SuperCard X. This malware exhibits significant code overlap with the previously documented NGate malware discovered by ESET in 2024. 

This novel campaign introduces a significant financial risk that extends beyond the conventional targets of banking institutions to affect payment providers and credit card issuers directly. The innovative combination of malware and NFC relay empowers attackers to perform fraudulent cash-outs with debit and credit cards. This method demonstrates high efficacy, especially when targeting contactless ATM withdrawals.

Introduction

The mobile threat landscape, particularly within the financial sector, is marked by a relentless evolution towards greater sophistication and scalability. As established attack vectors mature, novel trends emerge, introducing advanced functionalities that redefine the threat paradigm. A significant new trend challenging traditional banking institutions, payment institutions, and card issuers is the abuse of Near-Field Communication (NFC) technology. TAs increasingly exploit NFC capabilities to capture and relay sensitive data exchanged via this protocol. This emerging threat is not confined to a single region; recent reports, including those covered by KrebsOnSecurity, detail similar NFC-enabled fraud schemes in the US, leading to arrests linked to Chinese actors.

This article delves into a particularly active fraud campaign targeting Italy, which we assess to be associated with a previously undocumented Android malware offered through a Malware-as-a-Service (MaaS) model promoted as 'SuperCard X'. The nature of MaaS enables multiple affiliates to operate locally within their own regions or areas of specific interest. Consequently, we cannot exclude the possibility of similar or related campaigns being active in other regions globally. 

Our analysis will provide a comprehensive breakdown of the group's techniques, encompassing both sophisticated social engineering tactics and the deployment of this novel Android malware. We will detail the entire fraud lifecycle, from the initial phishing campaigns designed to deliver SuperCard X to the eventual cash-out operations exploiting the relayed NFC data. Given the potential for widespread impact due to the MaaS distribution model, we strongly recommend that banking institutions and card issuers maintain heightened vigilance regarding these emerging attack scenarios.

Dissecting the Fraud Scenario

The execution of this sophisticated fraud campaign unfolds through a series of well-orchestrated steps initiated by a targeted social engineering strategy. The attack typically starts with deceptive messages, often delivered via SMS or WhatsApp, designed to instil a sense of urgency or alarm in the recipient. These messages commonly impersonate bank security alerts, notifying users of a suspicious outgoing payment. The message prompts potential victims to call a specific number to dispute the transaction. This initial contact establishes a Telephone-Oriented Attack Delivery (TOAD) scenario, where TAs leverage direct phone conversations to manipulate their targets.

Figure 1: Example of SMS messages

During the ensuing phone call, the TAs employ persuasive social engineering tactics to guide victims through actions that ultimately compromise their payment card details. This multi-stage manipulation involves:

  • PIN Elicitation: Exploiting the victim's potential anxiety regarding the fraudulent transaction, the TAs convince them to "reset" or "verify" their card. Since victims often do not recall their PIN immediately, the attackers guide them through their mobile banking application to retrieve this sensitive information.
  • Card Limit Removal: Once they have gained the victim's trust and potentially their banking app access (through verbal guidance), the TAs instruct the victim to navigate to the card settings within their banking app and remove any existing spending limits on their debit or credit card. This crucial step maximizes the potential for fraudulent cash-out.
  • Malicious Application Installation: Subsequently, the TAs persuade the victim to install a seemingly innocuous application. A link to this malicious app, often disguised as a security tool or a verification utility, is sent via SMS or WhatsApp. Without the victim's knowledge, this application hides the SuperCard X malware, incorporating the NFC-relay functionality.
Figure 2: Messages containing URLs to download the malicious application
  • NFC Data Capture: As the final stage of the manipulation, the TAs instruct the victim to bring their physical debit or credit card into proximity to their infected mobile device. The SuperCard X malware then silently captures the card details transmitted via NFC. This data is intercepted in real-time and relayed through a Command and Control (C2) infrastructure to a second, attacker-controlled Android device.
  • Fraudulent Cash-Out: With the victim's card data successfully relayed, the TAs utilize their second device to perform unauthorized transactions. This typically involves contactless payments at POS terminals or, more alarmingly, contactless cash withdrawals at ATMs.

The following diagram illustrates the high-level overview of the described scenario:

Figure 3: Fraud Schema

It is important to emphasize the impact of this threat, as it no longer fits within the traditional fraud paradigm where the targets were customers of a specific bank. On the contrary, the operational context of this attack is mainly agnostic of the financial institution involved since the ultimate target of the fraudsters is the customers’ debit or credit cards, regardless of the issuing bank.

At the same time, one must consider the implications in terms of execution speed. Unlike traditional fraud scenarios, such as wire transfers, which may take up to two business days to process, allowing time for detection and intervention, this type of attack is executed instantly. It resembles an “instant payment” but with the added advantage for the attacker of immediately gaining access to the purchased goods or services. This creates a dual benefit for the fraudster: the rapid movement of stolen funds and the immediate usability of the fraudulent transaction.

Technical Analysis

This section provides a detailed technical analysis of the SuperCard X malware, facilitating Italy's observed NFC-relay fraud campaign. SuperCard X, while a newly identified threat in this context, exhibits strong foundational similarities with NFCGate, an open-source tool developed and released by the Technical University of Darmstadt (Germany) and publicly available on GitHub. SuperCard X also shares significant characteristics with NGate, an Android malware discovered by ESET in 2024 that similarly focused on exploiting NFC capabilities for malicious purposes in the Czech Republic. The close resemblance between SuperCard X and NGate strongly suggests that both malware families are built upon the reutilization of code and concepts originating from the NFCGate open-source project.

SuperCard X Architecture

The infrastructure underpinning the SuperCard X malware and its NFC relay capabilities involves a modular design, leveraging two distinct applications provided to its affiliates: "Reader" (identified by a blue icon) and "Tapper" (identified by a green icon).  The following Figure illustrates that the "Reader" application is the malicious component distributed to victims for capturing NFC card data. At the same time, the “Tapper” is installed into a device controlled by TAs. 

Figure 4: “Reader” and “Tapper” applications

Communication between the "Reader" and "Tapper" applications is facilitated through the HTTP protocol. This protocol utilizes a Command and Control (C2) infrastructure provisioned by the SuperCard X Malware-as-a-Service (MaaS) platform operators. This centralized C2 infrastructure is the intermediary for relaying the captured NFC data in real time.

To ensure the correct traffic routing between the various affiliates utilizing the MaaS platform, the "Reader" and "Tapper" applications require users to log in upon initial launch. This login procedure, as depicted in the provided screenshot of the login page, serves as an authentication and identification mechanism within the SuperCard X ecosystem.

Figure 5: Login for establishing a connection between the Reader and Tapper 

During the execution of a fraud scenario, the TAs proactively create an account within the SuperCard X platform. Once the victim has successfully installed the "Reader" application on their device (guided by the TAs via phone), the TAs communicate the pre-generated login credentials to the victim. This step is crucial as it establishes the link between the victim's infected device and the specific TA's "Tapper" instance, enabling the subsequent relay of the captured NFC data for fraudulent cash-out operations.

It’s worth mentioning that the “Reader” application contains an embedded file that stores multiple Answer To Reset (ATR) messages. These messages, typically used to initiate and negotiate communication parameters between a smart card and an NFC reader, are reused to facilitate card emulation. When the "Reader" captures and relays a victim’s card data, the corresponding ATR is transmitted via the C2 infrastructure to the "Tapper" device that is going to use this message to emulate a virtual card, effectively deceiving point-of-sale (POS) terminals or Automated Teller Machine (ATM) into recognizing it as a legitimate physical card. By leveraging ATRs, SuperCard X enables seamless, real-time relay attacks, allowing threat actors to bypass physical proximity constraints and carry out fraudulent transactions.

Figure 6: Match between an ATR and a card type

Low detection rate

An important aspect of SuperCard X is its current low detection rate among prevalent AV solutions. At the time of writing, samples analyzed by our team remain largely undetected by most vendors, as evidenced by the following Figure: 

Figure 7: SuperCardX fully undetectable (FUD)

This low detection efficacy can be attributed, in part, to the malware's focused functionality and consequent minimalistic permission model, which is a stark contrast to the extensive permission requests typical of modern, multi-functional Android banking trojans. 

Unlike its more complex counterparts, which often incorporate features such as remote control, SMS interception, and overlay attacks, SuperCard X primarily concentrates on a single, albeit highly effective, capability: NFC relay. The following snippet from its Manifest file highlights that the application predominantly declares only the essential android.permission.NFC permission. Alongside this, we observe only standard, non-suspicious permissions typically associated with basic application functionality. This deliberate limitation in requested permissions allows SuperCard X to perform its malicious core function while maintaining a benign profile.

Figure 8: SuperCardX Manifest file

Usage of Mutual TLS (mTLS)

SuperCard X employs mutual TLS (mTLS), a robust authentication mechanism, to secure communication with its C2 infrastructure. As highlighted in the following Figure, this approach goes beyond standard TLS encryption by requiring both the client (the SuperCard X application on the victim's device) and the C2 infrastructure to authenticate each other using digital certificates.

Figure 9: SuperCard X mTLS in practice

When a client attempts to connect to the C2 endpoint without providing the required client-side TLS certificate, the server responds with a 400 Bad Request error, explicitly stating "No required SSL certificate was sent." This effectively prevents unauthorized clients from interacting with the backend infrastructure, adding an additional layer of access control and hindering analysis attempts. Instead, when a client, possessing the correct client-side TLS certificate, connects to the C2 server, the server accepts the connection and proceeds with the communication.

Custom Builds

During our Threat Intelligence investigations into the SuperCard X campaign targeting Italy, our team identified several malware samples exhibiting characteristics suggesting the presence of custom builds tailored for specific affiliates or regional operations. While the core NFC relay functionality remains consistent across these builds, we observed a few modifications likely aimed at hindering detection and removing direct references to the MaaS Official Telegram channel.

Figure 10: SuperCard X repackage for Italian campaign

As illustrated in the comparison of the login screens, a key customization observed in these specific Italian campaign samples is removing the "Register" button. This modification aligns with the observed fraud scenario, where TAs pre-create accounts and directly provide login credentials to victims, rendering the in-app registration functionality unnecessary. This seemingly minor alteration streamlines the user interface of the malicious application presented to the victim, potentially reducing suspicion. Moreover, a better decoy has been implemented to mask the malicious nature of the application by using a benign-looking icon and application name.

Our analysis also revealed efforts to remove direct references to the Telegram channels associated with the SuperCard X MaaS platform within these custom builds. In the standard versions, these references likely serve as a communication or support channel for affiliates. Removing these indicators suggests the operators or the specific affiliates attempt to distance their operations and make attribution slightly more challenging.

Figure 11: Removed references 

Conclusion

As highlighted in this report, this new threat stands out from previous ones not so much due to the sophistication of the malware itself, but rather in terms of the fraud mechanism that relies on a novel technique associated with the NFC. This process allows the attacker to access the stolen funds instantly and potentially outside traditional fraud channels that typically involve bank transfers.

Another noteworthy aspect of this malware is its low fingerprinting profile. The malicious application merely collects NFC data and transmits it over a communication channel, making it less detectable through conventional behavioral analysis. Moreover, according to internal insight and investigation, we started to observe that NFC capabilities aren't limited to SuperCard X. Still, it's starting to be explored and embedded even in more conventional malware families, such as Copybara or DroidBot.

In conclusion, while this type of attack relies on relatively simple social engineering techniques, it proves to be highly effective—both in terms of success rate and cashout efficiency. Using multiple attack vectors within the same fraud campaign adds another layer of complexity.This multichannel approach poses additional challenges for monitoring efforts and highlights the growing need for real-time detection capabilities.

Appendix - Indicator of Compromise (IOCs)

Malware samples:

Hash App name
2c6b914f9e27482152f704d3baea6c8030da859c9f5807be4e615680f93563a0 Verifica Carta
3f39044c146a9068d1a125e1fe7ffc3f2e029593b75610ef24611aadc0dec2de SuperCard X
3fb91010b9b7bfc84cd0c1421df0c8c3017b5ecf26f2e7dadfe611f2a834330c KingCard NFC

C2 servers:

Domains
api.kingcardnfc[.]com
api.kingnfc[.]com
api.payforce-x[.]com

Subscribe to Cleafy LABS bulletins

Be among the first people worldwide to receive comprehensive technical reports on newly uncovered threats.

Subscribe now