Ghost Tapping Scam: Chinese Syndicates Steal Billions via NFC Phones

Ghost tapping is a rising cyber scam where criminals load stolen credit card data onto NFC-enabled burner phones for seamless in-person purchases, evading traditional fraud detection. Operated by Chinese syndicates via Telegram, it causes billions in losses globally. Enhanced security and international collaboration are essential to combat this threat.
Ghost Tapping Scam: Chinese Syndicates Steal Billions via NFC Phones
Written by Zane Howard

The Rise of Ghost Tapping

In the shadowy world of cybercrime, a sophisticated scam known as “ghost tapping” is emerging as a formidable threat to retail and banking security. Criminals are exploiting Near Field Communication (NFC) technology to load stolen credit card details onto disposable burner phones, enabling seamless in-person purchases that mimic legitimate transactions. This method, which bypasses traditional fraud detection systems, has seen a surge in activity, particularly among Chinese-speaking syndicates operating through encrypted channels like Telegram.

According to a recent report from TechRadar, scammers acquire card data from dark web marketplaces and use automated tools to provision these details into mobile wallets such as Apple Pay or Google Pay on burner devices. These phones, often cheap Android models, are then handed to “mules” who walk into stores, tap the device at point-of-sale terminals, and walk out with high-value goods like electronics or luxury items. The goods are quickly resold, laundering the illicit funds into clean cash.

How the Scam Operates

The mechanics of ghost tapping rely on NFC relay fraud, where stolen credentials are digitally “tapped” without the physical card ever being present. Insiders in the cybersecurity field note that this tactic evades many banks’ security measures because it appears as a contactless payment from a trusted app. A deep dive by Recorded Future reveals that Telegram channels serve as bustling hubs for these operations, with syndicates offering tutorials, stolen data bundles, and even pre-loaded burner phones for sale.

Victims often remain unaware until fraudulent charges appear on their statements, as no alerts are triggered in real-time. For instance, recent arrests in Auckland, as reported by 1News, involved a 25-year-old woman caught attempting luxury purchases worth thousands using this method. Such cases highlight the global reach, with similar incidents popping up in Southeast Asia and Europe.

Technological Vulnerabilities Exposed

At the core of ghost tapping’s success is the exploitation of mobile wallet provisioning processes. Cybercriminals use scripts to automate the addition of cards to wallets, circumventing verification steps that rely on one-time passwords or biometrics. Kaspersky‘s blog warns that even holding a physical card near a compromised smartphone can lead to unauthorized cloning, amplifying the risk in crowded public spaces.

Industry experts point to the adaptability of these threat actors. A post on X from cybersecurity analyst Nicki Kenyon referenced Recorded Future’s findings, emphasizing how burner phones facilitate money laundering by converting digital theft into tangible assets. This evolution marks a shift from online card-not-present fraud to hybrid attacks that blend cyber and physical elements.

Impact on Retail and Banking Sectors

The financial toll is staggering, with Resecurity estimating billions in losses from NFC-related fraud globally. Banks and retailers are scrambling to respond, implementing advanced monitoring for unusual provisioning patterns and enhancing point-of-sale authentication. Yet, the decentralized nature of these scams, fueled by dark web tools, makes eradication challenging.

For consumers, vigilance is key: enabling transaction notifications, using virtual cards, and avoiding public Wi-Fi for banking. As one banking executive confided, “This isn’t just theft; it’s an assault on the trust underpinning contactless payments.” The scam’s proliferation underscores the need for international collaboration to disrupt these networks.

Future Threats and Countermeasures

Looking ahead, ghost tapping could integrate AI-driven voice cloning or SIM swapping, as hinted in X posts discussing related scams. Publications like Cybersecurity News report that syndicates are developing tools for non-Chinese speakers, signaling broader adoption. Regulators are pushing for stricter wallet security standards, but insiders warn that without proactive measures, this ghost in the machine will continue to haunt the financial system.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us