VMX Labs has been systematically monitoring the adversary associated with the NFC fraud operation in Italy. We have identified indicators of a fraudulent card suspension scheme that relies on NFC relay malware and 3 specific NFC relay tools: SuperCard X, TX-NFC (YH-NFC), and TapPay. 

The recent threat intelligence report regarding SuperCard X has effectively unveiled 1 of the 3 malware threats within this adversary’s arsenal. In light of this disclosed information, we anticipate that the threat actor will begin utilizing the remaining two NFC relay malware, potentially targeting bank customers in its primarily focused regions: Italy and Spain.

Initially, we identified the following applications within the adversary’s infrastructure, which included the preliminary Verifica Carta malware samples generated by repackaging the original SuperCard X application.

App Name

Filename

Package ID

SuperCard X cccccc.apk io.dxpay.remotenfc.supercard
CYH发送 card.apk com.bobby.nfccardscanner
TapScan CARTA1.apk com.dream.remotenfc
Verifica Carta app1.apk io.dxpay.remotenfc.supercard1
Verifica Carta Carta.apk io.dxpay.remotenfc.supercard11

Table 1: Initial Findings

Our analysis identified subsequent distribution websites associated with two Verifica Carta malware variants, which were modified versions of SuperCard X. Among the 3 malware options, SuperCard X was the preferred choice.

App Name

Filename

Package ID

Verifica Carta VerificaCarta.apk io.dxpay.remotenfc.supercard11
Verifica Carta Verifica.apk io.dxpay.remotenfc.supercard11

Table 2: Samples in distribution

 

Figure 1: Distribution Website for the Verifica Carta malware

TX-NFC & TapPay malware

Chinese Malware-as-a-Service (MaaS) solutions for NFC relay fraud (a.k.a. Ghost Tap)

Our investigation has linked the CYH发送 (CYH-Send) Android application to a highly active Telegram channel with a membership exceeding 20,000 users. 

The application was recently rebranded from YH-NFC to TX-NFC. TX-NFC offers 4 subscription tiers, priced at $59 per day, $159 for three days, $239 per week, and $599 monthly, making it readily accessible to cybercriminals. All subscription packages include 24-hour availability and customer support, promising compatibility across most Android devices. 

The TX-NFC malware samples are packed with Jiagu 360, an infamous Chinese packer, to evade detection and protect against analysis. However, some antivirus (AV) companies automatically mark Jiagu-packed applications as potentially unwanted programs (PUPs).

Figure 2: TX-NFC Login

The TapPay Android application is also distributed via Telegram within a smaller community of over 200 members. 

Its subscription pricing structure—$15 for 3 hours, $35 per day, $150 per week, $260 for 15 days, and $360 per month—further enhances its accessibility for illicit activities. It provides discounted pricing for multiple account subscriptions and offers exclusive server access at a premium rate. The TapPay malware samples are packed with Bangcle (SecShell) packer.

Figure 3: TapPay (TapScan) Login

Our research suggests that SuperCard X malware was preferred for its ease of repackaging. Unlike the other two NFC-relay malware variants, SuperCard X lacked protective mechanisms. 

The remaining 2 malware samples are protected by basic packers, which are known to be ineffective and can be unpacked. Now that SuperCard X has been exposed, the threat actor will likely pivot to deploying the other 2 malware variants.

Video 1: TX-NFC (YH-NFC) promotion video

Indicator of Compromise (IOC) List

Indicator

Type

Description

3f39044c146a9068d1a125e1fe7ffc3f2e029593b75610ef24611aadc0dec2de SHA256 cccccc.apk [original:SuperCard_Card_Reader.apk]
api.payforce-x.com Domain Cccccc’s C2
c741047bebd677db945ddb204629fe12d8112dac52dfd8010057aab6314d42c1 SHA256 card.apk [original:CYH版本2-料方.apk]
syhcyh.com Domain Card’s C2
a3dc07ba191eb5f98682b01018ac42074868ba6fa6876e09083f1f3b574844d8 SHA256 CARTA1.apk [original:TapPay-料方-至尊版.apk]
178.157.63.209:49999 IP:PORT CARTA1’s C2
b7bd2167da0059bbb3e96325c7a36393b3cccdcf628c5d8c6639ef0274e341ab SHA256 app1.apk
api.kingcardnfc.com Domain App1’s C2
28bbdf5d51a8bce4b97ad1824116dff81f7e99aabf1cc63f816aedb57e9205fd SHA256 Carta.apk
api.kingcardnfc.com Domain Carta’s C2
4173b189e537b66cbb1ba62e67e095fa755db97b00904055153d0bf0ae545224 SHA256 VerificaCarta.apk
api.kingcardnfc.com Domain VerificaCarta’s C2
2c6b914f9e27482152f704d3baea6c8030da859c9f5807be4e615680f93563a0 SHA256 Verifica.apk
api.kingcardnfc.com Domain Verifica’s C2
282156d15c07da7aecf15fb7d1744a1283e8a3f5bb055815ba8108ede0ace588 SHA256 TX-NFC-C.apk
txnfc.com Domain TX-NFC-C’s C2
yhnfc.com Domain YH-NFC’s C2