Prilex malware can steal your credit card at checkout — here’s how

A shopper using tap to pay at checkout with their credit card
(Image credit: Shutterstock)

Paying for goods at checkout has never been easier thanks to mobile wallets and contactless credit cards but hackers have devised a new way to use the payment systems that enable these features against unsuspecting shoppers.

According to a new press release from the cybersecurity firm Kaspersky, its researchers have discovered new variants of the point-of-sale (PoS) malware Prilex that enables it to block contactless near-field communication (NFC) transactions.

While the cybercriminals behind Prilex started off by targeting ATM machines, they’ve now upgraded their malware to launch attacks against PoS systems like the ones you see at checkout at coffee shops, gas stations, convenience stores and other businesses.

Unlike other malware strains that infect users online, Prilex can now steal your credit card details in the real world where people rarely expect to fall victim to cybercrime.

GHOST attacks

With their malware deployed on a vulnerable PoS system, the cybercriminals behind Prilex are able to conduct “GHOST” attacks where they perform credit card fraud. Unfortunately, even credit cards protected by CHIP and PIN technology which was thought to be unhackable are at risk.

After responding to an incident involving one of its customers, Kaspersy’s researchers uncovered three new modifications to the Prilex malware that enable it to block contactless payment transactions.

Normally with a contactless credit card, you just tap it to pay but Prilex now has a way to block these transactions using a rule-based file that lets the malware know whether or not to capture credit card information. Since NFC-based transactions create a unique card number that’s only valid for one transaction, Prilex detects this and blocks it. When this happens, a message indicating there was a “contactless error” appears on a PoS system and shoppers are then prompted to insert or swipe their credit card instead.

Once a potential victim is forced to use their card, Prilex is able to capture all of the data from the transaction. However, the malware can also filter credit cards based on their type. This allows it to capture black or corporate credit cards with a higher transaction limit while ignoring cards with lower limits.

With a victim’s credit card details in hand, the cybercriminals behind Prilex can commit credit card fraud or even try to steal their identity.

How to stay safe from credit card fraud

five visa cards layered on top of each other

(Image credit: Shutterstock)

While the best antivirus software can help keep you safe from online threats, protecting yourself in the real world is a bit different. Especially when you’re used to being able to securely use your credit card at checkout.

To stay safe from the Prilex malware, you want to be extra careful when you see a “contactless error” after trying to use your credit card to tap to pay. When this happens, you’re better off trying to use cash if you have it but if you want to be extra careful, you can cancel the transaction altogether. It's also worth noting that this malware doesn't affect mobile wallets which is why you're better off using Apple Pay, Google Pay or Samsung Pay instead of your physical credit card.

In a blog post, the identity theft protection provider Aura recommends using a chip reader when possible as they’re more secure than tap to pay. At the same time, you should consider using one card for paying bills and another for everyday transactions. This way, you’ll know if your credit card information was stolen at a physical location instead of online.

The cybercriminals behind Prilex have been operating since at least 2014 and unless they’re apprehended by law enforcement, they and their PoS malware will likely remain a threat to watch out for.

TOPICS
Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
One phone with skull and crossbones on screen among several other clean-looking phones.
Malicious iPhone apps are spreading screenshot-reading malware on the Apple App Store — how to stay safe
An image of a CAPTCHA
Hackers are using reCAPTCHA to trick users into infecting their own PCs with malware — how to stay safe
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
and image of the Google Chrome logo on a laptop
Google Chrome at risk from shape-shifting browser extensions — how to stay safe
and image of the Google Chrome logo on a laptop
Google Docs under attack from info-stealing malware — how to keep your data and your emails safe
Latest in Malware & Adware
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
  • ALee7
    Couple of questions for clarification: the goal of the malware is to block your contactless transaction in order to force you to insert your card into the chip reader so they can capture your card info correct? if yes then why do you state "In a blog post, the identity theft protection provider Aura recommends using a chip reader when possible as they’re more secure than tap to pay. " If you insert your card into the chip reader you are doing exactly what the malware was trying to get you to do in the first place. The other question: why is apple pay and google pay not affected by this malware since both of them are also using NFC to conduct the payment? Is it because even though they all use NFC, the malware can't intercept google pay the way it's able to intercept credit card contactless transactions?
    Reply