EMV FraudDoes EMV Technology Stop Friendly Fraud?

April 24, 2024 | 12 min read

This image was created by artificial intelligence using the following prompts:

3d illustration of gold EMV chip on a red credit card with glowing light effects, black and teal background. Digital art style, dark color palette with gradients, high resolution, high detail, sharp focus.

EMV Fraud

In a Nutshell

Leveraging EMV technology is a key strategy in combating fraud, yet its protective measures are not a catch-all solution for every type of fraud affecting merchants and cardholders. This article will explain what EMV technology is and how it works. We’ll also look at the strengths and weaknesses of EMV fraud prevention and see where it fits into a broader strategy.

A Post-Liability Shift Guide to EMV Fraud Prevention

You’re probably familiar with EMV chip card technology at this stage in the payments game. The “chip” in question is that little gold microchip pressed into the front of your debit or credit card, which relays your secured information to the payment processor. What exactly does it do, though?

There’s encryption technology built into every EMV-enabled card that is very difficult for fraudsters to hack and duplicate. The chip tokenizes payment information rather than transmitting the cardholder’s actual data. This makes the EMV chip a much safer and more reliable means of transmitting payment information.

EMV Fraud

Using EMV technology is a valuable fraud prevention tactic. However, EMV fraud protection can't insulate merchants and cardholders against every type of fraud.

Is EMV Fraud Possible?

In short: yes.

EMV (Europay, Mastercard, and Visa) technology was crafted to enhance security for transactions where the physical payment card is swiped or inserted at a point-of-sale terminal or ATM. At the heart of its security features is a microprocessor chip embedded within the card. This chip generates a unique transaction code for each operation, reducing the chances of someone successfully counterfeiting the card or reusing transaction details for fraudulent activities.

That said, EMV technology can still be defeated. Devices like credit card shimmers allow criminals to capture data stored in the microchips implanted in EMV-compliant debit and credit cards.

EMV Fraud
Credit: Hackaday

Plus, the security offered by EMV technology hits a wall when it comes to card-not-present (CNP) transactions. These happen without the physical card being present during the payment process, like when you're shopping online, or placing an order over the phone. Payment information is manually inputted without interacting with the chip. Thus, EMV authentication can't come into play, leaving a gap in security measures for CNP transactions.

Common Examples of EMV Fraud

If a card is lost or stolen, it can be used by fraudsters for unauthorized transactions. Think about situations in which a PIN is not required, or in regions with lax security measures. Of course, a stolen EMV card is not the only way to defeat EMV technology.

Below are a few common examples of EMV fraud tactics. These include techniques that fraudsters use to exploit vulnerabilities in the system, as well as other methods of circumventing EMV technology.

EMV Bypass Cloning

In this sophisticated attack, fraudsters use devices or software to intercept communication between the chip card and the card reader. They trick the terminal into believing that the chip was read correctly when, in fact, the transaction was processed using stolen magnetic stripe data.

Shimming

This is similar to skimming. Card shimming involves inserting a shim (a paper-thin, card-sized device) with a microchip into the card slot of a terminal to intercept data from EMV chip cards. This data can then be used for fraudulent purposes, although the encryption of chip data makes this more challenging than traditional skimming.

Fallback Fraud

Also known as “chip read error fraud.” This scam occurs when a chip card is intentionally damaged, causing the card terminal to “fallback” to reading the magnetic stripe instead of the chip. This allows fraudsters to execute transactions with cloned magnetic stripe cards, even at terminals that support chip cards.

Card-Not-Present (CNP) Fraud

As mentioned above, EMV chips only secure card-present transactions. Any transaction where the card is not physically presented, such as in eCommerce, is vulnerable to fraud using stolen card information.

Data Breaches

If a merchant's system is breached, card data (including that from EMV transactions) can be stolen. While the chip itself makes cloning more difficult, personal and transaction data can still be exploited for online fraud.

Phishing

By using malware or phishing, fraudsters can intercept the cardholder's data during an online transaction. Though this doesn't directly compromise the EMV chip technology, it exploits the transaction process where the chip's security features are not in use.

These examples highlight the continuous arms race between security technologies and fraudsters. It’s true that EMV technology has significantly reduced certain types of fraud. However, criminals’ evolving tactics necessitate ongoing enhancements to payment security measures.

Is EMV Technology Driving CNP Fraud & Chargebacks?

It’s hard to say for certain.

As we’ve mentioned, EMV technology is highly effective at fighting in-person fraud. The chip technology embedded into every card is very difficult for fraudsters to hack or counterfeit. Even if the card has been physically stolen, using it without the necessary PIN code can be challenging.

On the other hand, eCommerce merchants have seen a significant surge in fraudulent activity following EMV adoption. In fact, Federal Trade Commission data reports that more than $10 billion were lost in 2023 due to card fraud. Of these figures, identity theft-based credit card fraud was the most common type, with around 426,000 cases reported annually in the US. That's down from 448,000 cases reported in 2022, but well above pre-pandemic levels.

This doesn’t mean that EMV causes fraud and chargebacks. But, it does mean that more people are shopping online every year, and fraudsters generally go where the path of least resistance brings them. They are far more likely to attack users online and out of sight of cameras or other detection devices. The chances of being detected are much slimmer. 

This phenomenon has a further compounding effect. As card-not-present fraud becomes more rampant, cardholders grow more wary of online activity. They become more prone to filing chargebacks, which in turn, leads to a spike in friendly fraud activity. EMV technology cannot detect or prevent this problem. 

Who Does EMV Fraud Impact Most?

EMV fraud, while impacting a broad spectrum of industries, has a particularly pronounced impact on certain verticals due to the nature of their transactions, customer interaction models, and the volume of CNP transactions. Understanding which sectors are most vulnerable — and why — can help in tailoring more effective prevention strategies. 

Here's a closer look at the verticals most prone to EMV fraud and the reasons behind their susceptibility:

Retail

Brick-and-mortar retailers that have not fully upgraded to EMV-compliant POS systems are at risk. Fraudsters will target less secure, outdated terminals to exploit the vulnerabilities in magnetic stripe transactions.

Additionally, EMV chips don’t protect online transactions. This makes online retail an attractive target for fraudsters using stolen card information.

Hospitality & Travel

The hospitality and travel sectors often process high-value transactions. This makes them lucrative targets for fraudsters looking to maximize the returns on their criminal activities.

Hotels and travel companies frequently handle bookings through online platforms, phone reservations, and in-person transactions, creating multiple points of vulnerability for fraud. Plus, these industries often deal with cross-border transactions, which can complicate the authentication process and increase the risk of fraud.

Financial Services

Financial institutions face EMV fraud through ATM skimming and shimming, where criminals attempt to capture chip data or exploit fallback transactions.

Being directly connected to consumers’ financial assets, the stakes in financial services are particularly high. That direct connection makes the sector a prime target for sophisticated fraud schemes aiming to bypass EMV security measures.

Gas Stations

The unique setup of gas stations creates multiple avenues for potential fraud. They have a mix of outdoor payment terminals for fuel purchases and in-store transactions for convenience items.

Many have opted for contactless EMV payment systems to limit their exposure to fraud and terminal manipulation. However, the fact that machines are generally left unattended (especially overnight) means there’s always inherent risk.

Healthcare

The healthcare sector is a target for the theft of sensitive personal information, which can be used in more complex fraud schemes. Not only that, but healthcare payments are very complex.

Payments in healthcare can come through various channels. There are online portals, in-person payments at clinics and hospitals, and over the phone. Each channel presents its own set of vulnerabilities.

There’s no such thing as “foolproof” fraud prevention technology. The only real solution is a dynamic, multilayer approach.REQUEST A DEMO

The vulnerability of these verticals to EMV fraud is primarily due to the nature of their transactions, the technological infrastructure in place, and the value of the transactions processed. Moreover, sectors that deal heavily in CNP transactions, or which have not fully transitioned to EMV-compliant systems, are particularly exposed.

Effectiveness of EMV Fraud Protection

EMV technology certainly helps prevent many instances of in-person fraud. It is not ubiquitous, though. Given that most transactions are shifting toward eCommerce sources, EMV cannot protect a cardholder or merchant from everything.

EMV TECHNOLOGY CAN

  • Make it more difficult for fraudsters to counterfeit cardholder data.
  • Make in-person fraud and card theft nearly impossible.
  • Protect user data stored in terminals and processors.
  • Help identify stolen or counterfeit cards.

EMV TECHNOLOGY CAN'T

  • Stop card numbers from being stolen and used online.
  • Protect data from unauthorized wifi access.
  • Protect data stored in merchant systems from online breaches.
  • Prove credentials for online purchases.

Another thing to consider is that not all card-present merchants adhere to EMV rules. Gas stations, for example, took significantly longer to migrate to the technology. As a result, incidents of fraud and chargebacks remain significantly higher in this industry compared to other verticals. Although the deadline to adhere to federal EMV mandates went into effect in April of 2021, many fueling and convenience stores are still not 100% compliant.

Greater adoption of EMV is an excellent deterrent against in-person and card-present fraud. But, like we mentioned earlier, it offers no real protection against card-not-present fraud outside of mobile wallet apps. And it offers even less protection against chargebacks.

Best Practices for EMV Fraud Prevention

Naturally, the best way to mitigate the consequences of EMV fraud is to avoid becoming a victim in the first place. 

Your aim should be to shield your operations and customer interests from risk. To do this, you should consider integrating the following practices into your daily operations:

#1 Ensure Complete EMV Compatibility

All payment terminals should be updated to support EMV chip transactions, substantially lowering the possibility of in-person fraud. This step helps stop counterfeit card use and aligns your business with global payment security standards.

#2 Implement 3DS Technology

3DS 2.0 technology enhances security for card-not-present (CNP) transactions by introducing a more sophisticated authentication process. This integrates seamlessly with mobile and online payments. The additional layer of security helps mitigate CNP and EMV fraud by requiring real-time, multi-factor authentication from the cardholder.

#3 Keep Terminal Software Current

Regular software updates for your payment terminals are essential. They protect against the latest threats and ensure that your EMV systems are functioning as intended.

#4 Train Staff on Fraud Awareness

Equip your staff with the knowledge to spot and respond to potential fraud. A well-informed team can act as the first line of defense against fraudulent activities, significantly enhancing in-store security.

#5 Apply Additional Verification for CNP Transactions

For transactions where the card isn't physically presented, use multilayer verification methods. These steps add redundancies, creating an extra layer of confirmation that the person making the transaction is initiated by a legitimate cardholder.

#6 Adopt Advanced Fraud Detection Tactics

Incorporating cutting-edge fraud detection practices can help you spot and stop more fraud attacks. These systems use advanced algorithms to analyze transaction patterns, providing real-time alerts to potentially fraudulent activities.

#7 Strengthen Online Transaction Security

Implement strong security measures for online sales, like SSL encryption. These measures reassure both merchants and customers by securing transaction data and adding an extra backend verification step.

#8 Actively Monitor Transactions

Keeping an eye on transaction patterns helps identify unusual or suspicious activities early. Prompt detection can prevent larger issues, mitigate potential losses, and stop a small problem from snowballing.

#9 Limit Customer Data Storage

Store only essential customer data. Also, comply with PCI standards to ensure any data you do retain is encrypted and securely managed. Reducing the volume of stored data minimizes the risks associated with data breaches.

#10 Educate Your Customers

Informing your customers about EMV security and safe payment practices helps protect them from becoming fraud victims. A customer base knowledgeable about security can significantly reduce the incidence of fraud.

Don’t Sleep On Friendly Fraud

As we’ve mentioned a few times, friendly fraud is a fast-growing problem that EMV fraud protections are useless to prevent. The reason for this has to do with the “gray area” factor. Banks are incentivized to keep cardholders happy, so they are disinclined to push back against customers over plausible disputes.

So, how can you push back against both EMV fraud and friendly fraud? Implement a strategy that combines the fraud prevention best practices listed above with effective chargeback management. That’s how.

Want to learn how merchants can better implement EMV and chargeback alert technologies to prevent all types of fraud without causing more chargebacks or false declines? Continue below and speak with the experts today.

FAQs

What does EMV stand for?

EMV stands for Europay, Mastercard, and Visa.

What does EMV counterfeit mean?

EMV counterfeiting refers to the fraudulent replication of a card's EMV chip data onto a new card, aiming to mimic the original card's security features for unauthorized transactions. Despite EMV technology's advanced security, this method attempts to bypass chip protections, exploiting vulnerabilities in the card processing system.

Can an EMV chip be counterfeited?

Technically, yes, but it is extremely difficult. Due to the tokenized nature of EMV technology, a fraudster would need a very advanced suite of tools to predict and replicate its randomized numerical coding. However, while this is currently very difficult, with the advent of AI and machine learning algorithms, it is no longer impossible. The trend of bypass cloning, for example, proves this. 

Can EMV chips be hacked?

Yes, but it’s rare. EMV chips are highly resistant to hacking due to advanced encryption and authentication protocols. However, no system is entirely invulnerable, and sophisticated attackers have occasionally found ways to exploit vulnerabilities in the EMV protocol, albeit with significant difficulty. Bypass cloning is one example of this attack being committed successfully. 

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form