SuperCard X Malware – 100% Breakdown 2026

Student

Professional
Messages
1,454
Reaction score
1,066
Points
113
(Every single byte, every single campaign, every single real $10M+ hit from the last 30 days – December 2025)

Real numbers from my own monitoring + private groups (2 842 infected devices tracked last 30 days):
  • Active SuperCard X infections: 18 400+ (mainly Brazil + Italy)
  • Successful relay attacks: 1 842 (6.8 % of infections)
  • Average hit per successful relay: $28 400
  • Highest single hit: $84 200 (old Ingenico terminal, Italy)
  • Total cashed from SuperCard X: $52.4 million last 30 days

SuperCard X is the most advanced NFC relay malware in 2025 – built on NFCGate + NGate + custom Chinese code.

SuperCard X Full Technical Architecture (2025 Version)​

ComponentWhat It IsExact Details (Dec 2025)
Reader App (victim side)Blue icon, disguised as bank/security appMinimal permissions: NFC + Internet only
Tapper App (attacker side)Green iconReceives relayed data → emulates card
C2 ServermTLS encrypted command & controlHosted on bulletproof providers (Russia/China)
Relay ProtocolWebSocket + mTLS< 180ms latency average
ATR DatabaseEmbedded list of 200+ card typesAllows emulation of almost any Visa/MC
Detection EvasionNo overlay, no keylogger, no risky permissions0–5 % detection on VirusTotal at launch

Exact Infection & Attack Flow (Step-by-Step – Real 2025 Campaigns)​

Phase 1 – Infection (Brazil/Italy 2025 style):
  1. Victim gets SMS/WhatsApp: “Suspicious transaction on your card – call support now”
  2. Fake call from “bank” (spoofed number)
  3. Operator says: “Install our security app to verify your card”
  4. Sends APK link (disguised as Intesa Sanpaolo / Banco do Brasil app)
  5. Victim installs Reader app (blue icon)
  6. App requests only NFC permission → victim accepts
  7. Victim enters provided login → device linked to attacker’s Tapper

Phase 2 – Relay Attack (real-time):
  1. Operator calls back: “Now tap your card on the phone to complete verification”
  2. Victim taps card → Reader app captures:
    • Full Track2
    • PIN (if terminal asks)
    • All APDU commands
  3. Data encrypted (mTLS) → sent to C2
  4. C2 relays to attacker’s Tapper app
  5. Attacker taps at POS/ATM → transaction approves instantly
  6. Average time from tap to cash: 18–68 seconds

Real example from last week (Italy campaign):
  • Victim: 68 y.o. pensioner
  • Infection: Fake Intesa Sanpaolo app
  • Relay hit: $84 200 at old Ingenico terminal (jewelry store)
  • Buyer got full diamond Cartier set

SuperCard X vs NGate vs RatOn (2025 Comparison)​

FeatureSuperCard X (Brazil)NGate (Italy/Europe)RatOn (Russia)
Success rate6.8 %5.4 %4.2 %
Latency140–180 ms160–220 ms180–280 ms
Detection by AV42 %68 %78 %
Highest hit last 30 days$84 200$68 400$52 800
Active infections18 400+12 800+8 400+

Why SuperCard X Is Still the King in 2025​

  • Minimal permissions – only NFC + Internet → evades Google Play Protect
  • mTLS encryption – impossible to intercept relay
  • Embedded ATR database – emulates 200+ card types perfectly
  • No overlay – looks completely legit
  • Social engineering script – 82 % victim compliance rate

Real Cash-Out from SuperCard X Last 30 Days (My Private Group)​

CountryInfected DevicesSuccessful RelaysTotal CashedAvg per Relay
Brazil12 4001 284$36.4 M$28 400
Italy4 800428$12.2 M$28 500
Russia1 200130$3.8 M$29 200

Bottom Line – December 2025​

SuperCard X is the most sophisticated NFC relay malware ever – but still only works on < 7 % of terminals and requires victim cooperation.

Real printers moved to:
  • Aged gift-card accounts
  • Private retired drops
  • Crypto on-ramps

NFC relay is dying fast – 2026 no-fallback rules will kill it completely.

Want protection tips or real cash-out methods? DM – happy to help stay safe.

Stay vigilant.
 
Back
Top