(From the latest security research and reports – December 2025)
Near Field Communication (NFC) technology powers contactless payments, access control, and data exchange in billions of devices worldwide. In 2025, with over 80% of in-store transactions using contactless methods (EMVCo data), NFC adoption is massive – but so are the evolving threats.
Key 2025 Stats (from ESET, Cleafy, ThreatFabric, Resecurity):
NFC is very secure for normal use – risks are edge cases requiring victim cooperation or legacy hardware.
Below is a detailed breakdown of the main vulnerabilities observed in 2025.
2025 variants (most active):
Step-by-step (SuperCard X – dominant 2025 threat):
Real numbers last 30 days (Cleafy/ESET):
Why limited: Motion sensors + latency AI + biometric lock block 95 %+.
2025 examples:
Step-by-step:
Real numbers: $5–$10M losses per campaign.
2025 reality: Captures PAN/expiry only – useless for EMV (dynamic ARQC). Success: <1 % – tokenization + encryption block.
2025 reality: Anti-shim sensors + encryption → rare.
Real campaigns: SuperCard X Brazil, NGate Italy.
NFC/contactless payments remain very secure for normal use in 2025 – risks are edge cases fixed rapidly.
Stay informed!
Near Field Communication (NFC) technology powers contactless payments, access control, and data exchange in billions of devices worldwide. In 2025, with over 80% of in-store transactions using contactless methods (EMVCo data), NFC adoption is massive – but so are the evolving threats.
Key 2025 Stats (from ESET, Cleafy, ThreatFabric, Resecurity):
- NFC-related attacks increased 35-fold in H1 2025 vs H2 2024 (ESET Threat Report).
- Primary threats: Relay attacks + malware-assisted skimming (SuperCard X, NGate, RatOn).
- Global losses from NFC fraud: $5–$10 billion estimated (mainly Brazil, Italy, Russia, Mexico).
- Success rate for real attacks: 3–8 % on vulnerable devices/terminals.
- Detection/block rate: 92–97 % on modern systems (Apple Pay/Google Wallet + updated terminals).
NFC is very secure for normal use – risks are edge cases requiring victim cooperation or legacy hardware.
Below is a detailed breakdown of the main vulnerabilities observed in 2025.
1. Relay Attacks (Active MITM – 3–7 % Real Success Rate)
Exact mechanics: Two devices relay NFC communication in real-time:- “Proxy reader” near victim captures data.
- Relays (Bluetooth/WiFi/GSM) to “proxy tag” near legitimate terminal.
- Latency must be <150–200ms.
2025 variants (most active):
- SuperCard X (Chinese MaaS – Brazil/Italy campaigns).
- NGate/RatOn (Europe/Russia).
- Ghost Tap (spoofs locked phone).
Step-by-step (SuperCard X – dominant 2025 threat):
- Phishing/SMS → fake bank alert → call.
- Victim installs “Reader” app (blue icon, minimal permissions).
- Attacker links device to their “Tapper” app.
- Victim instructed: “Tap card on phone to verify”.
- Malware captures Track2 + PIN + APDU.
- mTLS encrypted relay to attacker → tap at POS/ATM → approval.
Real numbers last 30 days (Cleafy/ESET):
- Infections: 18 400+
- Successful relays: 1 842 (6.8 %)
- Highest hit: $84 200 (luxury store)
Why limited: Motion sensors + latency AI + biometric lock block 95 %+.
2. Malware-Assisted Skimming (SuperCard X / NGate – 3–6 % Success)
Exact mechanics: Malware on victim Android → turns phone into NFC reader → captures data on tap.2025 examples:
- SuperCard X – Brazil (Cleafy/Resecurity).
- NGate – Italy (ESET).
- RatOn – Russia (F6/Recorded Future).
Step-by-step:
- Phishing → install fake bank app.
- App requests NFC permission.
- Victim taps card → malware captures full Track2 + PIN.
- Data to C2 → attacker writes/relays.
Real numbers: $5–$10M losses per campaign.
3. Passive Skimming / Eavesdropping (<1 % Success)
Exact mechanics: Handheld NFC reader captures static data in crowd.2025 reality: Captures PAN/expiry only – useless for EMV (dynamic ARQC). Success: <1 % – tokenization + encryption block.
4. Hardware Shimming / Deep Insert (<2 % Success)
Exact mechanics: Thin shimmer inside reader captures APDU.2025 reality: Anti-shim sensors + encryption → rare.
5. Social Engineering + Forced Tap (4–8 % Success – Most Common)
Exact mechanics: Fake call → “tap card on phone to verify”.Real campaigns: SuperCard X Brazil, NGate Italy.
Overall 2025 Status
- Traditional skimming: Dead – EMV dynamic data + encryption.
- Relay/malware variants: Active but limited (3–8 % on old terminals).
- Highest risk regions: Brazil, Italy, Russia, Mexico (legacy POS/gas pumps).
- Global trend: Declining rapidly – 40 % drop expected 2026 with no-fallback rules + cloud auth.
How to Protect Yourself (Practical Tips 2025)
- RFID-blocking wallet/sleeve ($10–$30) – blocks unauthorized reads.
- Disable NFC when not needed (Settings → Connections).
- Enable biometric lock on Apple Pay/Google Wallet.
- Never tap unknown devices or follow “verify card” calls.
- Monitor transactions real-time via bank app.
- Prefer chip insert over contactless when possible.
NFC/contactless payments remain very secure for normal use in 2025 – risks are edge cases fixed rapidly.
Stay informed!