{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiazpcpmq6hjy7hiiulc2fy367rkf76djcb45ql2xbavxulh77kqoe",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mm4uvvostn32"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigqeu76arey4or27paqq6wk4vslshr7slwf6e2uwf3ntj4v2peexi"
},
"mimeType": "image/png",
"size": 522957
},
"path": "/cleafy-labs/nfc-relay-goes-local-how-ai-is-accelerating-a-new-wave-of-independent-malware-developers",
"publishedAt": "2026-05-18T11:12:31.000Z",
"site": "https://www.cleafy.com",
"textContent": "\nCleafy's TIR team identified and analyzed two previously undocumented Android NFC relay malware families, DevilNFC and NFCMultiPay, actively targeting European and LATAM banking customers.",
"title": "NFC Relay Goes Local: How AI Is Accelerating a New Wave of Independent Malware Developers"
}