img
img

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks - FIN Smotr. Фото №1
Online Security

Mobile payment services have become a common and widespread tool for making purchases and transferring funds. All you need is a device with an NFC module, and almost any financial transaction can be made with a single touch. However, as technology has advanced, so has the interest of scammers.

Perpetrators use different methods to achieve their goals. But their main target is the theft of account and bank card data from users. The most frequent cases are Apple Pay system hacks and Google Pay fraud.

Vulnerabilities of Mobile Payment Systems

Despite the reliability of the technology, it is still vulnerable if the person using the system neglects cybersecurity rules. The complexity of scam attacks lies in the fact that often the owner doesn't even suspect that their funds are at risk. Usually, criminals do not attack the payment system itself; rather, they bypass account protection on the devices.

In cases of Apple Pay hacks, cyberattacks are aimed at accessing the Apple ID. Cybercriminals use fake websites, phishing, and counterfeit apps to gain control over tokens that replace bank card data. Once in the hands of the scammer, tokens are used to make payments on another device.

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks - FIN Smotr. Фото №2

Fraud with the Google Pay system is most often targeted at SIM card and email attacks. Fraudsters can easily spoof a phone number or intercept an SMS with an important code or password. This way, they gain access to users' accounts and have the ability to change their data, which is then used to bypass two-factor authentication and carry out transactions without the owner's knowledge.

The Most Common Attack Schemes

Many different methods are used to hack an account. Their main goal is to gain access to finances by bypassing all possible protection mechanisms. The focus is on psychological manipulation of users and technical vulnerabilities. Before the attack, the criminal studies the behavior of their future victim, the mobile device used for financial transactions, as well as the place of residence, after which one of the presented schemes is executed:

  • sending fake links to log into an account;
  • phone calls requesting to verify data and provide a code;
  • installing malicious software disguised as an application or service;
  • intercepting the NFC signal when in close contact with the device;
  • obtaining data through phishing (fake) emails from Apple or Google.

Protecting one of these elements does not guarantee complete security if any other is vulnerable. That is why comprehensive mobile payment protection is important. It should cover both physical access to the device and digital verification and identity confirmation.

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks - FIN Smotr. Фото №3

How to Protect Apple Pay and Google Pay from Scammers

Perpetrators planning to break into someone else's account are always looking for weak spots. Even with all necessary updates and all protection steps completed, the user themselves may pose a threat by doing something wrong. That's why a systematic approach is needed for reliable mobile payment protection. To minimize the risk of hacking, it is recommended to take the following actions:

  1. Choose strong passwords for account logins and enable biometric verification.
  2. Regularly update the operating system and payment applications.
  3. Prohibit the installation of programs and apps from unknown sources.
  4. Always check suspicious links received in emails before clicking.
  5. Use two-step verification and monitor active sessions.

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks - FIN Smotr. Фото №4

Before applying these measures, pay attention to

privacy settings — permission for location display, Bluetooth, and background data transfer. Any unexpected activity, even if not related to fund withdrawals, may indicate an attempted cyberattack. The faster such actions are detected, the higher the chance of preventing consequences.

Actions to Take in Case of a Payment System Hacking Attempt

If there is suspicion of an unauthorized transaction or account hacking attempt, it is important to act immediately. First, disconnect the internet on the device in use and record important details (time, what happened, what caused suspicion). The faster these measures are taken, the greater the chance of avoiding fund theft or account blocking.

The next step is to temporarily disable all payment cards. It is also crucial to change the passwords of your Apple ID or Google account. Then, it is recommended to log out of all active sessions on all devices to limit the hacker's access possibility.

How Scammers Steal Money through Apple Pay and Google Pay: Schemes and Risks - FIN Smotr. Фото №5

Contact technical support to get information about all recent activities. If signs of unauthorized interference are detected, report it to the bank. Once the threat is eliminated, it is necessary to check all security settings and ensure that nothing else exposes the digital payment system to a new cyberattack.