How to remove PhantomCard/NFCShare banking trojan from Android

Also Known As: PhantomCard/NFCShare banking malware

Damage level:

Get free scan and check if your device is infected.

Remove it now

To use full-featured product, you have to purchase a license for Combo Cleaner. Seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

What is PhantomCard/NFCShare?

PhantomCard and NFCShare are two researcher-given names for the same Android banking trojan, which uses NFC relay attacks to steal contactless payment card data and PINs. ThreatFabric named the Brazil-targeting build PhantomCard; D3Lab named the Italy-targeting build NFCShare. Both are regional variants of the same Chinese Malware-as-a-Service family known as NFU Pay.

PhantomCard NFCShare banking trojan fake NFC card verification screen

PhantomCard/NFCShare malware overview

PhantomCard/NFCShare is built around NFC relay attacks. Once installed, the malicious app presents a fake card verification screen telling the victim to tap their contactless payment card against the back of their phone. Behind the scenes, it silently captures the card's data through the device's built-in NFC reader.

The fake screen mimics a genuine banking security check, walking the victim through three steps: hold the card near the phone, wait for it to be detected, then enter a PIN. The prompts closely resemble real bank verification flows, and many victims follow them without suspecting anything is wrong.

Once the card data and PIN are captured, they are sent in real time over a WebSocket connection to attacker-controlled servers. A criminal on the other end uses a companion application to emulate the victim's card on their own device.

With that emulated card, the attacker can make unauthorized contactless payments at point-of-sale terminals or withdraw cash at ATMs. The victim's physical card never leaves their hands - yet their money can be stolen while the card is still nearby.

The malware has appeared in two distinct regional campaigns. In Brazil, ThreatFabric documented it as PhantomCard, posing as a "Card Protection" app distributed through fake Google Play Store pages complete with fabricated user reviews. In Italy, D3Lab documented it as NFCShare, spread through phishing sites impersonating Deutsche Bank Italy, which instruct visitors to download an APK file as a supposed bank app update.

Under the hood, both builds share the same NFC relay code base, the same victim-facing UI (translated into the local language), and similar string obfuscation. ThreatFabric attributes the platform to NFU Pay, a Chinese Malware-as-a-Service offering that lets operators build customized region-targeted versions with their own banking lures.

The malware targets EMV payment card data, and the NFCShare build uses XOR encryption through NPStringFog to hide its server address from security tools. It also carries embedded Chinese-language strings consistent with the same toolkit.

It has to be mentioned that malware developers often improve upon their software and methodologies, so future versions could add new capabilities. In summary, the presence of PhantomCard/NFCShare on a device can lead to severe financial losses, serious privacy issues, and identity theft.

Threat Summary:
Name PhantomCard/NFCShare banking malware
Threat Type Android malware, malicious application, banking trojan.
Detection Names Avast-Mobile (APK:RepMalware [Trj]), Combo Cleaner (Android.Riskware.SpyAgent.MI), ESET-NOD32 (Android/Spy.NGate.BZ Trojan), Kaspersky (HEUR:Trojan-Banker.AndroidOS.GhostNFC.e), Full List (VirusTotal)
Symptoms The device is running slow, system settings are modified without user's permission, questionable applications appear, data and battery usage is increased significantly, browsers redirect to questionable websites, intrusive advertisements are delivered.
Distribution methods Fake Google Play Store pages, phishing websites impersonating legitimate banking institutions.
Damage Stolen payment card data (card numbers, expiry dates, PINs), unauthorized contactless transactions, monetary losses, identity theft.
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.

Download Combo Cleaner

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Banking trojan examples

Examples of other Android banking trojans include Massiv, Sturnus, and Klopatra. Like PhantomCard/NFCShare, threats of this kind exploit trust in familiar banking interfaces to carry out theft without the victim realizing anything is wrong.

Regardless of the variant, the end result is the same: stolen payment credentials, unauthorized transactions, and drained accounts. Staying alert to unofficial app download requests is one of the most effective defenses.

How did PhantomCard/NFCShare infiltrate my device?

PhantomCard/NFCShare reaches victims through campaigns tailored to specific countries. In Brazil, it spreads through fake Google Play Store pages impersonating a legitimate app, complete with fabricated user reviews. Victims who download and install the APK from those pages unknowingly grant the trojan access to their device's NFC hardware.

In Italy, the same malware is delivered through phishing sites that mimic Deutsche Bank Italy. These sites pressure visitors into downloading an APK file described as a required banking app update, using phishing tactics to push an unofficial installation outside of the app store.

Banking trojans of this kind also spread through links in SMS messages, posts on social media, and third-party app stores. Any app that has to be downloaded through a browser link rather than the official Google Play Store should be treated with strong suspicion.

How to avoid installation of malware?

Only download apps from the official Google Play Store or directly from your bank's verified website. Legitimate banks do not ask customers to install app updates by downloading an APK file through a link in an SMS or on an unofficial webpage.

Keep Android and all installed apps updated, and use a reputable mobile security tool. If any app asks you to tap your payment card against your phone or enter your PIN outside of your bank's official app, stop immediately and contact your bank through its official number to report the request.

PhantomCard fake NFC card verification overlay (Portuguese-language variant, targeting Brazil):

PhantomCard banking trojan fake NFC card verification screen - Portuguese variant targeting Brazil

NFCShare fake NFC card verification overlay (Italian-language variant, targeting Italy):

NFCShare banking trojan fake NFC card verification screen - Italian variant targeting Italy

Quick menu:

Delete browsing history from the Chrome web browser:

Deleting web browsing history from Chrome in Android operating system (step 1)

Tap the "Menu" button (three dots on the right-upper corner of the screen) and select "History" in the opened dropdown menu.

Deleting web browsing history from Chrome in Android operating system (step 2)

Tap "Clear browsing data", select "ADVANCED" tab, choose the time range and data types you want to delete and tap "Clear data".

[Back to Table of Contents]

Disable browser notifications in the Chrome web browser:

Disabling browser notifications in the Chrome browser in Android operating system (step 1)

Tap the "Menu" button (three dots on the right-upper corner of the screen) and select "Settings" in the opened dropdown menu.

Disabling browser notifications in the Chrome browser in Android operating system (step 2)

Scroll down until you see "Site settings" option and tap it. Scroll down until you see "Notifications" option and tap it.

Disabling browser notifications in the Chrome browser in Android operating system (step 3)

Find the websites that deliver browser notifications, tap on them and click "Clear & reset". This will remove permissions granted for these websites to deliver notifications. However, once you visit the same site again, it may ask for a permission again. You can choose whether to give these permissions or not (if you choose to decline the website will go to "Blocked" section and will no longer ask you for the permission).

[Back to Table of Contents]

Reset the Chrome web browser:

Resetting Chrome browser to default in Android operating system (step 1)

Go to "Settings", scroll down until you see "Apps" and tap it.

Resetting Chrome browser to default in Android operating system (step 2)

Scroll down until you find "Chrome" application, select it and tap "Storage" option.

Resetting Chrome browser to default in Android operating system (step 3)

Tap "MANAGE STORAGE", then "CLEAR ALL DATA" and confirm the action by taping "OK". Note that resetting the browser will eliminate all data stored within. This means that all saved logins/passwords, browsing history, non-default settings and other data will be deleted. You will also have to re-login into all websites as well.

[Back to Table of Contents]

Delete browsing history from the Firefox web browser:

Delete browsing history from the Firefox in the Android operating system (step 1)

Tap the "Menu" button (three dots on the right-upper corner of the screen) and select "History" in the opened dropdown menu.

Delete browsing history from the Firefox in the Android operating system (step 2)

Scroll down until you see "Clear private data" and tap it. Select data types you want to remove and tap "CLEAR DATA".

[Back to Table of Contents]

Disable browser notifications in the Firefox web browser:

Disable browser notifications in the Firefox web browser in the Android operating system (step 1)

Visit the website that is delivering browser notifications, tap the icon displayed on the left of URL bar (the icon will not necessarily be a "Lock") and select "Edit Site Settings".

Disable browser notifications in the Firefox web browser in the Android operating system (step 2)

In the opened pop-up opt-in the "Notifications" option and tap "CLEAR".

[Back to Table of Contents]

Reset the Firefox web browser:

Resetting Firefox browser in the Android operating system (step 1)

Go to "Settings", scroll down until you see "Apps" and tap it.

Resetting Firefox browser in the Android operating system (step 2)

Scroll down until you find "Firefox" application, select it and tap "Storage" option.

Resetting Firefox browser in the Android operating system (step 3)

Tap "CLEAR DATA" and confirm the action by taping "DELETE". Note that resetting the browser will eliminate all data stored within. This means that all saved logins/passwords, browsing history, non-default settings and other data will be deleted. You will also have to re-login into all websites as well.

[Back to Table of Contents]

Uninstall potentially unwanted and/or malicious applications:

Removing unwanted/malicious applications from the Android operating system (step 1)

Go to "Settings", scroll down until you see "Apps" and tap it.

Removing unwanted/malicious applications from the Android operating system (step 2)

Scroll down until you see a potentially unwanted and/or malicious application, select it and tap "Uninstall". If, for some reason, you are unable to remove the selected app (e.g., you are prompted with an error message), you should try using the "Safe Mode".

[Back to Table of Contents]

Boot the Android device in "Safe Mode":

The "Safe Mode" in Android operating system temporarily disables all third-party applications from running. Using this mode is a good way to diagnose and solve various issues (e.g., remove malicious applications that prevent users you from doing so when the device is running "normally").

Booting Android device in Safe Mode

Push the "Power" button and hold it until you see the "Power off" screen. Tap the "Power off" icon and hold it. After a few seconds the "Safe Mode" option will appear and you'll be able run it by restarting the device.

[Back to Table of Contents]

Check the battery usage of various applications:

Checking the battery usage of various applications in the Android operating system (step 1)

Go to "Settings", scroll down until you see "Device maintenance" and tap it.

Checking the battery usage of various applications in the Android operating system (step 2)

Tap "Battery" and check the usage of each application. Legitimate/genuine applications are designed to use as low energy as possible in order to provide the best user experience and to save power. Therefore, high battery usage may indicate that the application is malicious.

[Back to Table of Contents]

Check the data usage of various applications:

Checking data usage of various applications in the Android operating system (step 1)

Go to "Settings", scroll down until you see "Connections" and tap it.

Checking data usage of various applications in the Android operating system (step 2)

Scroll down until you see "Data usage" and select this option. As with battery, legitimate/genuine applications are designed to minimize data usage as much as possible. This means that huge data usage may indicate presence of malicious application. Note that some malicious applications might be designed to operate when the device is connected to wireless network only. For this reason, you should check both Mobile and Wi-Fi data usage.

Checking data usage of various applications in the Android operating system (step 3)

If you find an application that uses a lot of data even though you never use it, then we strongly advise you to uninstall it as soon as possible.

[Back to Table of Contents]

Install the latest software updates:

Keeping the software up-to-date is a good practice when it comes to device safety. The device manufacturers are continually releasing various security patches and Android updates in order to fix errors and bugs that can be abused by cyber criminals. An outdated system is way more vulnerable, which is why you should always be sure that your device's software is up-to-date.

Installing software updates in the Android operating system (step 1)

Go to "Settings", scroll down until you see "Software update" and tap it.

Installing software updates in the Android operating system (step 2)

Tap "Download updates manually" and check if there are any updates available. If so, install them immediately. We also recommend to enable the "Download updates automatically" option - it will enable the system to notify you once an update is released and/or install it automatically.

[Back to Table of Contents]

Reset the system to its default state:

Performing a "Factory Reset" is a good way to remove all unwanted applications, restore system's settings to default and clean the device in general. However, you must keep in mind that all data within the device will be deleted, including photos, video/audio files, phone numbers (stored within the device, not the SIM card), SMS messages, and so forth. In other words, the device will be restored to its primal state.

You can also restore the basic system settings and/or simply network settings as well.

Resetting the Android operating system to its default (step 1)

Go to "Settings", scroll down until you see "About phone" and tap it.

Resetting the Android operating system to its default (step 2)

Scroll down until you see "Reset" and tap it. Now choose the action you want to perform:
"Reset settings" - restore all system settings to default;
"Reset network settings" - restore all network-related settings to default;
"Factory data reset" - reset the entire system and completely delete all stored data;

[Back to Table of Contents]

Disable applications that have administrator privileges:

If a malicious application gets administrator-level privileges it can seriously damage the system. To keep the device as safe as possible you should always check what apps have such privileges and disable the ones that shouldn't.

Disabling Android applications that have administrator privileges (step 1)

Go to "Settings", scroll down until you see "Lock screen and security" and tap it.

Disabling Android applications that have administrator privileges (step 2)

Scroll down until you see "Other security settings", tap it and then tap "Device admin apps".

Disabling Android applications that have administrator privileges (step 3)

Identify applications that should not have administrator privileges, tap them and then tap "DEACTIVATE".

Frequently Asked Questions (FAQ)

My Android device is infected with PhantomCard/NFCShare, should I format my storage device to get rid of it?

Formatting your storage device is typically not necessary to remove PhantomCard/NFCShare. Running a reputable mobile antivirus application such as Combo Cleaner should be sufficient to detect and eliminate the malware without wiping your device.

What are the biggest issues that PhantomCard/NFCShare can cause?

The most direct risk is financial theft. The malware captures contactless payment card data and PINs in real time, enabling attackers to make purchases or ATM withdrawals using an emulated copy of the victim's card. Victims often do not realize anything is wrong until unauthorized charges appear on their bank statement.

Can PhantomCard/NFCShare steal money from my contactless payment card without me noticing?

Yes. The malware tricks victims into tapping their payment card against the phone and entering a PIN through a fake verification screen. The captured data is relayed instantly to attackers, who emulate the card on their own device and use it for contactless payments or ATM withdrawals - all without ever physically possessing the card.

How did PhantomCard/NFCShare infiltrate my Android device?

PhantomCard/NFCShare is distributed through region-tailored campaigns: fake Google Play Store pages in Brazil and phishing sites impersonating Deutsche Bank in Italy. Both versions rely on social engineering to convince users to install an unofficial APK file outside of the official app store.

Will Combo Cleaner protect me from malware?

Combo Cleaner is capable of detecting and eliminating nearly all known malware infections. Remember that performing a complete system scan is essential, as sophisticated malicious programs typically hide deep within the system.

Share:

facebook
X (Twitter)
linkedin
copy link
Tomas Meskauskas

Tomas Meskauskas

Expert security researcher, professional malware analyst

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats.

▼ Show Discussion

PCrisk security portal is brought by a company RCS LT.

Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

Donate