In an increasingly connected world, online security is becoming a major concern for smartphone users. As cybercriminals compete in ingenuity to exploit vulnerabilities in Android and iOS operating systems, cybersecurity experts are doubling their efforts to reveal their tactics and raise awareness among Internet users.
Recently, a new vulnerability was revealed by the investigative journal “Fatshimetrie”: a financial fraud technique allowing hackers to access victims’ bank accounts without needing their physical cards or phones. Thanks to applications containing bank card information, scammers can steal money discreetly.
Security experts have warned of a cyber attack called “Ghost Tap”, which clones cards linked to Google Pay and Apple Pay, thus facilitating the withdrawal of funds from victims’ accounts. This evolution of online fraud is reminiscent of last year’s “NGate” malware, which allowed withdrawals from ATMs. However, this time, the scammers are transferring the money to money brokers in different countries, allowing them to withdraw the funds without requiring a credit card or mobile device.
Once in possession of the password required for Google Pay or Apple Pay, the scammers can make purchases anywhere in the world with any card reader. This is made possible by malware installed on legitimate banking applications or digital payment applications.
It is essential to protect your banking data against this type of attack. Although the banks’ fraud prevention mechanisms can detect these unauthorized transactions due to the security measures required to verify the user’s identity, the risk remains. Bad usage habits and lack of awareness of the risks increase the likelihood of funds being stolen.
Mona Magdi, an information security expert, warns against certain habits that can expose users to cyberattacks. It is therefore essential to be vigilant and follow good online security practices to protect yourself against ever-evolving scams. In an age of rapidly evolving technology, awareness and education remain the best tools to counter digital threats.