NGate Android Malware Targets Brazil, Abuses HandyPay App
A new iteration of the NGate Android malware family is actively targeting users in Brazil, according to The Hacker News. This campaign marks a shift in tactics, with threat actors now abusing the legitimate HandyPay application instead of the previously observed NFCGate.
ESET security researcher LukΓ‘Ε‘ Ε tefanko notes that attackers have patched the HandyPay app β designed to relay NFC data β with malicious, seemingly AI-generated code. This trojanized application is then used to steal NFC data and PINs, directly compromising mobile payment security for affected users.
This move from a known malicious app to a legitimate, trusted one is a classic evasion technique. It leverages user trust and bypasses basic app store scrutiny, making detection harder for the average user. Defenders need to recognize this pattern.
What This Means For You
- If your organization's users operate in or travel to Brazil, especially those using Android devices for payments, this is a critical threat. Advise them to strictly download apps from official app stores and scrutinize permissions. Remind users that even legitimate apps can be trojanized. Implement strong mobile device management (MDM) policies to restrict sideloading and enforce app integrity checks.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| NGate-Campaign-2026-04 | Trojan | Android malware family: NGate |
| NGate-Campaign-2026-04 | Malware Abuse | Legitimate application abused: HandyPay |
| NGate-Campaign-2026-04 | Data Theft | Stolen data: NFC data, PINs |
| NGate-Campaign-2026-04 | Targeted Region | Brazil |