SuperCard X is a sophisticated Android malware that targets users primarily in Italy. It exploits Near Field Communication (NFC) technology to perform real-time relay attacks, allowing cybercriminals to carry out unauthorized transactions using victims’ payment cards. Distributed through Malware-as-a-Service (MaaS), it spreads via deceptive social engineering tactics such as smishing (SMS phishing) and fraudulent phone calls. Victims are tricked into installing malicious applications disguised as legitimate security tools.
Threat Overview
SuperCard X tricks users into installing a malicious app that acts as a fake security verifier. Once installed, the app captures data from the victim’s NFC-enabled payment card when placed near the device. This information is relayed to an attacker’s device, which then emulates the victim’s card to execute fraudulent transactions via Point-of-Sale systems or ATMs.
Threat Summary
Attribute | Details |
---|---|
Threat Type | Android malware, malicious application, unwanted application |
Detection Names | Avast-Mobile (Android:Evo-gen [Trj]), Combo Cleaner (Android.Riskware.MobilePay.TV), ESET-NOD32 (A Variant Of Android/Spy.KNFC.A), Kaspersky (HEUR:Trojan-Banker.AndroidOS.CardNSuper.a) |
Symptoms of Infection | Slow device performance, unauthorized system setting modifications, appearance of questionable applications, increased data/battery usage, pop-ups |
Damage | Theft of personal information, identity theft, financial loss |
Distribution Methods | Social engineering (smishing and phone calls), deceptive applications, scam websites |
Danger Level | High |
Removal Tool | SpyHunter |
In-Depth Analysis
How Did I Get Infected?
Infection typically begins with a deceptive SMS or WhatsApp message posing as a security alert from your bank. The message urges the recipient to call a phone number. Once connected, scammers impersonating bank employees instruct the victim to install a fake “security” app. When the victim brings their payment card close to the infected phone, the app captures NFC data, unknowingly handing it over to the attacker.
What Does It Do?
The malware uses the NFC data collected from the victim’s card and transmits it to a second device operated by the cybercriminal. This device uses a companion app to mimic the card, allowing it to make purchases or withdraw money. The communication between devices is secured using encryption protocols, and the app requests minimal permissions to avoid suspicion, helping it evade detection.
Should You Be Worried for Your System?
Yes. SuperCard X is highly dangerous due to its ability to execute real-time payment fraud through contactless technology. Users who frequently use NFC payments are especially at risk. Its use of social engineering and advanced communication encryption makes detection and prevention challenging without professional tools.
General Signs Your Android Device Has Malware
- Unusual battery drain
- Sluggish performance or overheating
- Annoying pop-up ads—even when not using a browser
- Unauthorized app installs or unfamiliar apps
- Unexpected spikes in data usage
- Redirects when browsing or locked browser tabs
- Sudden crashes or reboots
- Disabled antivirus or security settings
How to Check for Malware by Device Type
Android Phones & Tablets
Step 1: Boot into Safe Mode
- Hold the Power button until the power menu appears
- Long-press Power off, then tap Reboot to safe mode
- This disables third-party apps temporarily
Step 2: Check App List
- Go to Settings > Apps > See all apps
- Look for:
- Apps you didn’t install
- Apps with generic names (e.g., “Update Service” or “Security Tool”)
- Apps with excessive permissions
Step 3: Use Google Play Protect
- Open Google Play Store
- Tap your profile icon > Play Protect
- Tap Scan
Android TV Devices
Step 1: Check Installed Apps
- Go to Settings > Apps
- Look for unrecognized or recently installed apps
Step 2: Review Sideloaded APKs
- Use a file manager (e.g., X-plore File Manager) to inspect sideloaded apps
- Avoid APKs from sources other than APKMirror or Google Play
Step 3: Scan Using Sideloaded Antivirus
You can install:
- Malwarebytes
- Bitdefender
Use APKMirror to sideload if unavailable in Play Store
Step 4: Factory Reset if Infected
- Go to Settings > Device Preferences > Reset > Factory data reset
Android Emulators (e.g., BlueStacks, NoxPlayer, LDPlayer)
Step 1: Check Installed Apps
- Open emulator > Settings > Apps
- Remove unknown apps or those not installed via Play Store
Step 2: Install Antivirus Inside the Emulator
- Use Google Play in the emulator to install:
- ESET Mobile Security
- Malwarebytes
Step 3: Monitor Network Activity
- On PC: Use tools like Wireshark or GlassWire
- Or install a firewall app within the emulator
Step 4: Reset or Reinstall Emulator
- Reset to a clean snapshot or uninstall and reinstall the emulator
Section 3: Manual Removal Steps (All Devices)
1. Remove Suspicious Apps Manually
- Go to Settings > Apps > [App] > Uninstall
- If app is a device admin:
- Settings > Security > Device admin apps
- Disable admin rights, then uninstall
2. Clear App Data and Cache
- Settings > Storage > Cached data
- Settings > Apps > [App] > Storage > Clear Data & Cache
3. Revoke Dangerous Permissions
- Settings > Privacy > Permission Manager
- Revoke camera, SMS, and location access from unfamiliar apps
4. Check Accessibility & Admin Settings
- Settings > Accessibility > Installed Services
- Settings > Security > Device admin apps
Section 4: Preventing Future Malware Infections
- Avoid third-party app stores unless trusted (e.g., F-Droid, APKMirror)
- Enable Google Play Protect
- Keep system and apps up to date
- Use a VPN on public Wi-Fi
- Do not click unknown links in texts or emails
- Review app permissions before installation
- Enable Two-Factor Authentication (2FA) when available
Section 5: When to Perform a Factory Reset
Do this if:
- A malicious app cannot be removed
- Malware persists after antivirus scans
- Device performance is severely affected
How to Factory Reset:
- Settings > System > Reset > Factory data reset
- Back up important data before proceeding
Summary Checklist
Action | Device Type | Tools/Notes |
---|---|---|
Safe Mode | Phones/Tablets | Isolate third-party apps |
App Audit | All | Settings > Apps |
Antivirus Scan | All | Malwarebytes, Bitdefender |
Factory Reset | All | Last resort step |
Emulator Cleanup | Emulators | Reset or reinstall software |
App Permission Review | All | Revoke unnecessary access |
Bonus Tip: Use a Security Suite
For ongoing protection, consider installing a comprehensive mobile security suite that includes:
- Real-time scanning
- Anti-phishing tools
- VPN
- Call and SMS blocking
- App lock features
Conclusion
SuperCard X is a powerful Android malware exploiting NFC functionality to steal money and personal data in real-time. Its stealthy operation and deceptive installation methods make it a severe risk for users relying on mobile banking and contactless payments. Using trusted anti-malware tools such as SpyHunter is crucial to identifying and removing this threat from your device.