Card CloningAn Insidious Threat Hurting Merchants & Cardholders

Roger Alexander | May 9, 2025 | 8 min read

This featured video was created using artificial intelligence. The article, however, was written and edited by actual payment experts.

What is Credit Card Cloning?

In a Nutshell

Card cloning is a form of payment fraud where criminals create a duplicate of a legitimate payment card by copying its data, often through techniques like skimming or data breaches. This counterfeit card can then be used to make unauthorized purchases or withdraw cash, leaving the cardholder vulnerable to financial losses. Preventative measures such as EMV chip technology, transaction monitoring, and consumer awareness are crucial for minimizing the risk of card cloning.

A Primer on Credit Card Cloning: How it Works & How You Can Prevent It

Say you walk into a convenience store. You pick out a snack, and pull out your credit card to pay.

The cashier rings up your total, and you insert your card into the payment terminal at the point-of-sale (POS) device. A few moments later, the transaction is approved. You walk out with your snack in hand, giving little thought to the transaction you just made.

Several days later, however, a handful of unauthorized transactions begin to show up on the same card you used at the gas station. 

To your knowledge, you didn’t give out your payment information to anyone. So, what could’ve happened? It’s possible that somebody might’ve compromised that POS device with the intent to steal your card information and engage in card cloning.

What is Card Cloning?

Card Cloning

[noun]/kard • klōn • iNG/

Card cloning or is a form of card-present fraud in which scammers harvest payment card information, then use that information to create a copy of a valid credit or debit card.

Think about the example above. When you inserted your card into the payment terminal at the convenience store, it was read by the merchant’s legitimate payment terminal. But, there might well have been a fraudster’s skimming device jammed into the terminal as well, collecting your data. Once a scammer has your card data, they can use it to create a clone of your credit card.

According to the FBI, card cloning is a very common practice. Skimmers installed at fuel pumps, POS terminals, ATMs, and physical card readers cost merchants and consumers an estimated $1 billion per year.

Cardholder swipes card at a compromised terminal

Step #1 | Card used at compromised terminal

The cardholder swipes their card at a payment terminal compromised by a skimmer.

Skimmer captures card data

Step #2 | Skimmer captures card data

The skimmer captures the cardholder’s card information and relays it to the scammer.

Fraudster transfers data to a blank card

Step #3 | Data transfer

The scammer transfers the captured data onto a blank card.

Cloned card used

Step #4 | Cloned card used

The card, which now contains the cardholder’s stolen payment information, can be used to make fraudulent purchases.

It’s also a growing threat: data from credit analytics firm FICO shows that roughly 120,000 debit cards were involved in card cloning attacks in the first half of 2023, up 77% from the approximately 70,000 cards impacted in the first half of 2022.

illustration: two cloned cards

How Card Cloning Works

TL;DR

A scammer gains access to a target’s credit card information. They then copy that information onto a blank payment card, which can be used to make purchases.

Card cloning can be thought of as a two-step process.

In the first step, a fraudster harvests card numbers and PINs from victims using physical card skimmers, which are concealed inside a card reader without the knowledge of either the merchant or the cardholder. Whenever a victim swipes or inserts their card at the compromised card reader, the skimmer reads the payment information and transmits it to the fraudster.

Learn more about shimming

Now, the second step can occur. The fraudster takes the details stolen by the skimmer and copies (or “clones”) them onto a blank payment card. The fraudster, now in physical possession of a card that is linked to the victim’s account without either their awareness or consent, can use the victim’s stolen payment details to make purchases or withdraw cash.

Did You Know?

Fraudsters will have an easier time stealing information from magstripe transactions than from chip-enabled payments. That’s because a card’s magstripe statically encodes the card’s primary account number, while an EMV chip relays a one-time code that “stands in” for the payment method’s actual account number. That said, technologies exist that enable scammers to compromise EMV-enabled cards, too. This is known as card shimming.

How Do Scammers Get Data for Card Cloning?

Fraudsters use a variety of illegal hardware devices and psychological tactics to steal card information from victims:

  • Card Skimmers: hardware attached to card readers to capture PINs and magnetic stripe data.
  • Card Shimmers: devices used to capture data stored in the microchips of EMV-compliant payment cards.
  • RFID Cloning: devices used to remotely siphon data from NFC-enabled payment cards from a distance.
  • Dark web data vendors: illegal brokers who acquire and then resell sell stolen data, typically leaked during data breaches.
  • Social engineering: manipulative psychological techniques that cause victims to divulge sensitive or personally identifying information.
  • Phishing: malicious emails or text messages that appear to be from legitimate and reputable sources.

These are some of the most common tactics. But, there are literally dozens of different schemes that bad actors can run to get access to cardholder data. Then, once they have the necessary information in hand, they can clone the victim’s card and start making fraudulent purchases in minutes.

Signs of Card Cloning

How do you know if you’ve been targeted by a card cloning scam?

There’s no surefire way to determine whether your information’s been compromised by card cloning. But, there are some red flags you can look out for, both before and after the incident:

Physical Tampering at ATMs & POS Devices

Inspect the card reader for bulkiness or loose parts, and try wiggling the device to see if anything comes off. If you’re paying for gas at the pump, pay close attention to the security seal; if it’s broken, that’s a red flag.

Unauthorized Transactions in Distant Locations

Transactions marked as "card-present" despite the cardholder not using the physical card. These purchases may occur in a totally different city or country from where the cardholder is located.

“Test” Transactions

Scammers may engage in card testing to see if their cloned card is working. This involves submitting a few small charges before moving on to a bigger charge.

Declined Transactions Followed by Approvals

Fraudsters often try multiple attempts before finding a merchant or terminal that accepts the cloned card. So, getting multiple declined authorization attempts in a row may signify cloning.

Unexpected Card Declines

The merchant will receive a decline code whenever a transaction fails authorization. If the merchant’s terminal shows decline code 05 or code 59, it means that the issuer suspects fraud. Should that be the case, contact your bank immediately.

Abnormal Spending Patterns

Buyers typically establish a set pattern of behavior in terms of card usage. Purchases in an unusual merchant category, high-ticket purchases, or behavior inconsistent with the cardholder’s habits are all red flags.

Transaction at Known Compromised Terminals

Purchases made at gas stations, ATMs, or merchants previously linked to skimming activity should automatically be treated as suspicious.

Reduce future chargebacks by managing them today

Proactive Strategies for Long-Term Chargeback Reduction

Request a Demo
The Original End-to-End Chargeback Management Platform

Impact of Card Cloning on eCommerce Merchants & Financial Institutions

Cardholders aren’t the only ones who suffer from card cloning attacks.

Merchants and financial institutions are the ones who ultimately bear the cost of fraudulent transactions. Every dollar lost to fraud ultimately costs US sellers and banks $4.61. That’s because card cloning attacks and other forms of fraud come back to bite businesses in the form of:

Alert!

Chargeback Losses

Cardholders who discover they’ve been the victim of card cloning aren’t liable for any fraudulent transactions beyond the limits imposed by law. Victims can file chargebacks against these transactions.

The result is that card cloning fraudsters get items for free, while merchants lose out on revenue and inventory. On top of that, sellers are assessed chargeback fees, which can range from $20 to $100 per dispute.

Alert!

Damage to Brand Reputation

Whenever card cloners attach illegal skimmers or shimmers to a legitimate business’ card readers, those merchants are victims, too. But, to many shoppers, it doesn’t feel that way.

Even though the seller is innocent, a cardholder may instinctively avoid buying from the business again, for fear of being re-victimized. For the merchant, a single card cloning attack could erode trust, damage their brand’s reputation, and cause customers to flee to competitors.

Alert!

Higher Fraud Prevention Costs

Deterring card cloning attacks is a costly and time-consuming process. Merchants will need to train staff on how to detect and remove illegal skimming and shimming devices, dedicate time to helping customers impacted by fraud, and stay up to date on the latest fraud tactics.

Besides, card cloning is only one of many threat sources that needs to be addressed. Merchants will need to combat other threats like card testing, new account fraud, and account takeover (ATO) scams.

Did You Know?

Criminal fraud chargebacks that occur as a result of third-party fraud, like card cloning, account for less than 10% of all chargebacks encountered by merchants. The vast majority of chargebacks are themselves fraudulent, filed by customers-turned-fraudsters who abuse the dispute process for their own benefit.

Regulations & Industry Standards to Fight Card Cloning

Merchants will need to follow a multi-layered strategy that encompasses both current and upcoming fraud prevention initiatives.

Industry Standard

Regulatory Compliance

To start, sellers should ensure that they are in full compliance with PCI-DSS requirements. This includes PCI-DSS Requirement 9.9, which mandates that merchants “protect devices that capture payment card data via direct physical interaction with the card [like POS terminals and card readers] from tampering and substitution.”

In practice, this means maintaining an inventory of devices, periodically inspecting devices for tampering, and training staff to be aware of — and to report — suspicious behavior.

Industry Standard

EMV Compliance

Using EMV-compliant card readers can also help merchants avoid some liability for fraud and contain the damage done when card cloning scams do arise.

EMV-complaint chip cards generate one-time cryptograms that are sent to the issuer for authentication. Even if a sophisticated "shimmer" device intercepts data during an EMV transaction, the captured cryptogram cannot be reused for future fraudulent transactions. It won’t totally prevent fraud, but it may limit the damage that can be dealt in a single card cloning attack.

Industry Standard

Card Network Compliance

Merchants should also leverage fraud prevention initiatives developed by Visa and Mastercard to their own benefit.

Using network tokenization services like Visa Token Service, for instance, can help sellers maximize data security and protect sensitive cardholder information from data breaches. In addition, capabilities like Mastercard’s Cyber Intelligence service can help businesses quickly understand and respond to emerging threats.

How to Detect & Prevent Cloned Card Fraud

Merchants have a number of tools they can use to detect and prevent card cloning attacks. This type of fraud can be dealt with in two ways:

Advice

Deterring Data Harvesting Attacks

One of the simplest ways to stop card cloning fraud is to regularly monitor card readers for illegally-installed hardware devices that allow fraudsters to steal cardholder information in the first place.

In practice, this means regularly monitoring all ATM and POS devices for signs of tampering or unauthorized use. Examine card readers for loose parts, unusual bulkiness, broken seals, or loose cables, and ask employees to regularly conduct manual audits for illegal hardware. The earlier a card skimmer or shimmer is removed, the less harm it can do.

Advice

Preventing Fraudulent Purchases After Card Information Has Been Harvested

Despite merchants’ best efforts, some card information will inevitably be stolen. For this reason, sellers will also need to prevent card cloning fraudsters from transacting with stolen information. 

Deploying complementary fraud detection tools at checkout can help sellers block purchases that are attempted with stolen and cloned cards. Initiatives include:

  • Implementing 3-D Secure Technology
  • Monitoring IP Addresses for Inconsistencies
  • Using Device Fingerprinting Tools
  • Leveraging AI-driven Behavioral Analytics Systems
  • Flagging Suspicious Transaction Patterns
  • Implementing Fraud Scoring Tools
  • Using Geolocation Services
illustration: sketchy atm

Get Help With Chargeback Prevention

Card cloning fraud is frustrating because it can lead to legitimate chargebacks that often can’t be challenged in representment.

The good news, though, is that criminal fraud chargebacks are almost entirely preventable. Comprehensive fraud detection solutions from Chargebacks911® can help preserve your revenue and inventory from scammers by stopping card cloning fraud from morphing into chargebacks.

Curious to learn more? Reach out to us for a no-obligation ROI analysis today.

FAQs

Do card cloners get caught?

Card cloning is illegal, but unfortunately, few criminals ever get caught. According to SoFi, fewer than 1% of cases involving credit card fraud are solved by the police. That said, those who are apprehended could face fines, jail time, or both.

Can a cloned card be used at an ATM?

Yes, a cloned card can be used at an ATM if the fraudster previously captured the card’s PIN.

What happens if your card is cloned?

If your card is cloned, fraudsters can sell it online on the dark web or use it to make unauthorized transactions. In either case, you could experience disruption or financial losses.

How did someone use my debit card without having it?

Fraudsters don’t need to get their hands on your debit card to use it. Card cloning techniques, which involves obtaining a debit or credit card’s details via illegal skimmer or shimmer devices, can allow scammers to duplicate your debit card without your knowledge or consent.

How do you find a credit card skimmer?

To find a credit card skimmer, look for signs of tampering or unusual bulkiness. If parts of the card reader can be removed, there’s a good chance it could have been compromised by an illicit skimmer or shimmer device.

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form