In this article:
In this article:
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.
In this article:
In this article:
Credit card cloning — also called skimming — copies data from a legitimate card’s magnetic stripe onto that of a duplicate card.
Excising your credit card information is easier than it seems. One way is to fasten a skimming device onto a card reader. Any time someone swipes their card, the skimmer collects the magstripe data flowing through it.
Two men hacked hundreds of credit cards this way, placing skimmers at gas stations all over Fresno and Southern California [*]. They stole more than $195,000 from victims, using these cloned credit and debit cards.
Card cloning scams like these boil down to two steps:
1. Scammers obtain credit card information — through skimmers or other means
2. They create fake cards
In South Carolina, two men were arrested after police found 15 cloned credit cards while searching their vehicle [*]. The men had already used the cards to buy $5,000 worth of merchandise.
{{show-toc}}
EMV, short for Europay, Mastercard, and Visa, is a worldwide standard for smartcard payment. Before EMV existed, all of a credit or debit card’s data was secreted in its magnetic stripe. With the right equipment, anyone — including scammers — could read it and reproduce your card.
EMV cards prevent credit card fraud by storing card numbers and Card Verification Values (CVVs) in a special microchip. This method offers two layers of security:
Most financial institutions use the combination of CVV1 and iCVV to verify each transaction. Since iCVVs change with each transaction, banks look for mismatches to spot fraud.
While scammers can’t clone an actual EMV chip, they can still produce counterfeit cards and peddle them on the Dark Web.
Shimmers — skimmers for EMV cards — steal unique card identifiers called Track2 Equivalent values. Scammers print these values onto the magnetic stripes of fake, new cards.
When they use the counterfeit cards, they claim that their chip “doesn’t work” — so the merchant swipes the card instead.
Criminals use a hacked payment terminal to capture special security codes that EMV chip cards send. These codes can be back-dated to allow new transactions; scammers don’t even need to present a physical card.
“Pre-play attacks” are common, too. In this credit card scam, a hacked terminal doesn't repeat codes but can predict them.
While these tactics seem far-fetched, they produce very real results. Using similar techniques, researchers at ZDNET cloned four out of 10 EMV cards, all of which were from different banks [*].
{{show-cta}}
Scammers are always looking for new ways to snatch and exploit credit card data. Here’s how to spot and avoid credit card skimmers:
Skimmers are widely used for credit card cloning. In the first half of 2023, there was a 77% spike in the number of cards impacted by skimming [*]. Roughly 185 cards were affected per attack.
Always look inside a card reader before using it. If it seems like another card is already inserted, you’re probably looking at a shimmer.
Move the reader around a bit, too. Loosely attached readers may indicate tampering. If you’re at a gas station, compare your reader to the others to make sure they match.
Most American banks offer their customers large purchase, high balance, and suspicious activity alerts.
Bank of America, for example, gives users the option to monitor whether their credit or debit card is being used online [*]. Opt in to email, text, or mobile app alerts in your bank account settings.
Bank ATMs have more security measures in place than the ones at malls or other high-traffic areas. The Federal Deposit Insurance Corporation (FDIC) advises examining ATM personal identification number (PIN) keypads for sticky keys, as well as looking for hidden cameras and checking for loose wires or seams [*].
Apple Pay and Google Pay aren’t as susceptible to physical card skimming or shimming. The downside is that a scammer can still use your stolen credit card via a mobile wallet.
Most terminals that accept contactless payments don’t need PIN codes or signatures on receipts. This makes tap and go — or no cardholder verification method (CVM) fraud — easy [*].
As of February 2023, Mastercard has a $100 CVM limit per contactless card payment in the United States [*]. Visa and American Express can process up to $200 per transaction. Please note that this limit varies by country.
Hackers can also use unsecured Wi-Fi networks to spy on your activity — stealing your card number as you browse. If you must access the internet via public Wi-Fi, use a virtual private network (VPN) to encrypt your connection.
Follow these steps if you’ve lost your credit card or think someone else has used it.
Aura is consistently rated a top credit monitoring and identity theft provider by consumers just like you.
Get near-immediate fraud alerts, a built-in Dark Web scanner, instant Experian credit lock, and a $1,000,000 insurance policy for every adult on your Aura plan in case of identity theft. Aura can help — even if your credit card gets lost or stolen.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.