DevilNFC Android Malware Uses Kiosk Mode to Trap Victims During NFC Relay Attacks

May 20, 2026

A dangerous new Android malware called DevilNFC has emerged, combining NFC relay attacks with a Kiosk Mode trap that locks victims inside a fake banking screen until their card data is stolen.

The malware targets customers across Europe and LATAM with technical precision rarely seen in independently built tools.

Unlike previous threats, DevilNFC does not rely on shared infrastructure or borrowed code — it is built entirely from the ground up by a distinct threat actor group.

The attack begins with a phishing message via SMS or WhatsApp, directing the victim to a landing page impersonating the Google Play Store.

The page presents the malicious app as a mandatory security update from a legitimate Spanish-language banking institution.

Once installed, the malware activates immediately and the victim loses control of their device without realizing it.

Notable NFC Relay Malware Families Observed Over the Past Year (Source - Cleafy)
Notable NFC Relay Malware Families Observed Over the Past Year (Source – Cleafy)

Analysts at Cleafy, whose Threat Intelligence and Response team identified and analyzed the malware, noted that DevilNFC is the more advanced of two newly documented NFC relay families, with the other being NFCMultiPay. 

Cleafy said in a report shared with Cyber Security News (CSN) that despite sharing no code or infrastructure, both families are actively conducting NFC relay attacks against banking customers.

Their concurrent appearance across overlapping geographies marks a significant turning point in the NFC relay threat landscape.

DevilNFC Android Malware Uses Kiosk Mode

What makes DevilNFC especially alarming is how completely it isolates the victim. On launch, the malware locks the device using Android’s Kiosk Mode, displaying a social engineering template fetched from a remote server.

AI artifacts in both malware families (Source - Cleafy)
AI artifacts in both malware families (Source – Cleafy)

The system UI disappears and the hardware back button is disabled, trapping the victim inside the fraudulent interface while the relay completes. Both malware families show development patterns consistent with generative AI-assisted tooling.

Over-engineered phishing templates in DevilNFC and LLM-characteristic emoji-formatted logging in NFCMultiPay point to operators using uncensored AI models alongside leaked malware codebases in public repositories, lowering the barrier for building functional Android malware considerably.

Kiosk Mode for Card Reading and Pin Harvest (Source - Cleafy)
Kiosk Mode for Card Reading and Pin Harvest (Source – Cleafy)

Once the victim opens the app, DevilNFC activates Kiosk Mode to hide the system UI and override the hardware back button with an empty handler.

This traps the victim inside the malicious interface while the relay session completes silently. A fake verification pop-up rendered remotely from a C2 template then prompts the victim to enter their four-digit card PIN after the first card tap.

The PIN is exfiltrated to two destinations simultaneously: a dedicated C2 endpoint and the attacker’s private Telegram channel, sent in plaintext alongside the bank name and victim’s public IP address.

The interface then deliberately triggers a fake verification error, instructing the victim to hold their card for an extra ten seconds.

This is a designed extension of the relay window, ensuring the transaction completes before any success screen appears.

DevilNFC uses a Dual-Role APK architecture where a single application serves as both a passive NFC reader on the victim’s unrooted device and a card emulator on the attacker’s rooted hardware.

This is achieved through a hooking framework injecting DevilNFC’s relay module directly into Android’s NFC daemon process. The result is a relay pipeline capable of authorizing ATM withdrawals and chip-and-PIN transactions at any global point of sale.

AI-Assisted Development and the Broader Threat Shift

Both malware families carry indicators of AI-assisted development. In DevilNFC, phishing templates from the live C2 are over-engineered relative to their function, featuring CSS and JavaScript structured with architectural precision and deliberate edge-case error handling.

NFCMultiPay’s debug logs show emoji-categorized metric labels separated by ASCII borders, a pattern characteristic of LLM-generated logging scaffolding.

This trend is confirmed by ESET Research, which in April 2025 identified a new NGate variant targeting Brazilian users where injected code carries the same AI development indicators and Portuguese strings.

Local groups are no longer purchasing access to Chinese platforms — they are building their own tools. Researchers recommend that users avoid installing apps outside official stores, never enter a card PIN in a session they did not initiate, and report any device locked to a full-screen interface to their bank immediately.

Indicators of Compromise (IoCs):-

Type Indicator Description
Domain nfcrackatm[.]com DevilNFC C2 / Relay Server
Domain spicynagets[.]shop DevilNFC C2 / Relay Server
IPv4 185.203.116[.]18 NFCMultiPay C2
IPv4 47.253.167[.]219 NFCMultiPay C2
MD5 caa5e8cf3275339d251210072ebe88c2 DevilNFC APK Sample
MD5 35dd9c3a56e88a39bf6c8fdad46b0398 NFCMultiPay APK Sample
MD5 9d19527aeb4cabfb40bbaea6d73b5ff0 NFCMultiPay APK Sample
Package Name com.devilnfc.reader DevilNFC APK Package Name

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Original article can be found here