Chinese Hackers Deploy NFC-Enabled Android Malware

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

Chinese hackers deployed NFC-enabled Android malware capable of spreading via near-field communication interactions. The malware abuses NFC functionality to trigger automatic payload delivery or data exchange when devices are in close proximity. Once installed, it collects contacts, messages, credentials, and application data, and communicates with attacker-controlled servers for further instructions.

Who is affected

Android users with NFC enabled are directly exposed, including employees using personal or corporate mobile devices in shared physical environments.

Why CISOs should care

Proximity-based malware bypasses traditional network defenses and introduces physical-layer risks into mobile security programs.

3 practical actions

Disable unnecessary NFC features: Limit NFC functionality on corporate-managed devices.

Monitor mobile behavior: Detect abnormal app permissions and background network activity.

Educate employees: Raise awareness of physical-proximity attack techniques.