Card cloning might seem old-school, but it is far from gone. It remains an old favorite in the advanced fraudster's playbook, precisely because the underlying infrastructure, magnetic stripes, PIN pads, and ATM networks, has not fundamentally changed. The attack surface is the same. The tools have just gotten quieter.
What has changed is sophistication. Where early card fraud relied on crude skimmers bolted to card slots, modern operations use near-invisible "shimmers" that slide inside chip-enabled terminals, intercepting EMV data during a legitimate transaction. The arms race between card issuers and fraud rings is ongoing, and the fraudsters have not stopped running.
"The magnetic stripe was supposed to be replaced by the chip. The chip was supposed to stop cloning. Neither did. Fraud adapts faster than infrastructure."
The Five-Stage Modus Operandi
Card cloning follows a well-established operational sequence. Each stage has its own tools, specialists, and counter-detection techniques. In organized fraud rings, these stages are often handled by different actors, connected through dark web forums and Telegram channels.
Evidence: A Cloned Card at an ATM
The video below shows a fraudster testing a cloned card at an ATM, withdrawing £10 as a test transaction to confirm the clone is operational before a larger cash-out. This is classic "card testing" behavior: a low-value transaction designed to stay below alert thresholds while confirming the card is live.
Why Card Cloning Has Not Disappeared
The persistent survival of card cloning as a fraud vector comes down to infrastructure inertia. Despite EMV chip migration, magnetic stripe functionality remains active on most cards globally to ensure backward compatibility with older terminals. As long as the stripe is readable, it is a target.
The emergence of shimmers, which intercept data from EMV transactions rather than magnetic swipes, is particularly concerning. It represents the fraud ecosystem's adaptation to a defensive technology, rather than surrender to it. The same pattern has appeared before, with PIN capture evolving alongside chip rollout.
The most damaging card cloning operations do not use a single cloned card at a single ATM. They coordinate dozens of cards across multiple ATMs simultaneously, exploiting the window between fraud detection and card blocking.