Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026

2026-02-07

Football Fans Can Share Their ‘Super Bowl Spread’  With The Chance To Win an NFL Jersey

2026-02-07

Why Traditional Banks Need Mobile Money Solutions to Survive the Next 5 Years

2026-02-07
Facebook X (Twitter) Instagram
Trending
  • Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»News»Are contactless cards cloneable?
News

Are contactless cards cloneable?

Gugu LourieBy Gugu Lourie2016-06-23No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on copying an out-of-date implementation of the contactless standard to be successful. By Niel van der Walt

There are two standards that contactless cards generally support: a legacy magnetic stripe compatible mode and an EMV compliant mode. The magnetic strip compatibility allows contactless cards to be used in the place of old swipe-to-pay technology. While such backwards compatibility makes upgrading to contactless technology easier, it means that the security flaws inherent in the old technology are still present in contactless cards.

The EMV complaint implementations use secure cryptography and transaction checks that make even the most advanced cloning techniques obsolete. Contactless cards also support the new EMV complaint standards and therefore the entire card cannot be cloned, only the legacy implementation part of the card can be cloned.

How is cloning of transactions done?

A criminal needs to get a contactless reader within close proximity to the card he intends to copy. While reading of contactless data should be possible up to 10 cm, in practice this distance needs to be less than 5 cm to be reliable. The reason for the range limitation is that the contactless card receives its power directly from the reader, and sufficient power transfer is only possible at short range.

The contactless card reader presents the victim’s card with a payment request that mimics that of a payment terminal. Different payment processors such as MasterCard and VISA have their own security implementations to attempt to provide security. The standards between these payment processors differ, however, and the cloning process is unique to the type of card.

MasterCard

The criminal’s contactless reader will query the victim’s card many times, using a new random number for the transaction each time. The card’s response is recorded each time and stored in a table for later use in cloning transactions. The attack ends when the criminal has gathered all of the responses to the possible random numbers. It can take between 10 seconds and 10 minutes to complete this process since between 100 to 10000 random numbers need to be tried.

The criminal will then transfer the data to a programmable contactless card or to a cellphone with contactless capabilities. The criminal will then buy goods to just below the value the contactless payments allow, which is about R200.00 in South Africa, and present the programmed card or cellphone for payment. The payment terminal generates a unique random number that it sends to the card to attempt to verify that the payment method is not a clone. Because the clone contains all the valid responses to all the possible random numbers, it looks up the correct response and sends it to the terminal. The payment proceeds using the card details that were copied from the victim and the payment usually succeeds.

VISA

Depending on the implementation, the victim’s card may only use a static CVV to authenticate a contactless payment. This means that copying one transaction gives enough information to clone the legacy transaction implementation of a VISA card. The criminal will bring a contactless reader close to the victim’s card and issue a standard processing request to it. The victim’s card will respond with the card details and the CVV number. The criminal will then write this data to a programmable contactless card or to his cellphone with contactless capabilities. Presenting the cloned details for a transaction will most likely be successful. The same payment limit exists as for the MasterCard implementation.

What can be done to prevent my card transactions from being cloned?

At present customers need to insist that banks provide them with safe contactless cards that conform to up-to-date international security standards. Secure contactless card implementations do exist, but many banks are currently not making use of these methods. While the legacy modes are sometimes required for successful transactions, there exist secure implementations of these modes that are not easily cloneable.

Furthermore, payment processors can update their systems to detect cloned cards and block them. Any cloning method will cause a detectable change in the payment details due to the sequential nature of payments. A break in the sequence is an indication that card cloning may have occurred.

Until improvements to the way contactless cards implement transactions are made and payment terminals are programmed to detect and reject cloned cards, contactless technology will remain at risk.

Is contactless technology safe?

Contactless card crime is currently on the increase, but thus far the statistics show that it is of much less concern than other payment methods. Having said that, contactless fraud may increase significantly as criminals gain access to hardware and software that allow them to steal contactless information.

It is the responsibility of the banks and payment processors to make sure they stay one step ahead of criminals by updating their contactless cards to use secure transaction standards.

The response of MasterCard to the issue is that their standards already contain sophisticated countermeasures to cloning attacks.

The failure at this point is not that the contactless standards are insecure, but rather that outdated standards are used. Implementing the available countermeasures to card cloning and other attacks would improve contactless card technology to a very high level of security.

  • Niel van der Walt at MWR Infosecurity

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie
Gugu Lourie

Related Posts

Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel

2026-01-30

How a Major Hotel Group Is Electrifying South Africa’s Travel

2026-01-29

Volvo ES90 South Africa Launch: Pricing, Specs & Core, Plus, Ultra Trims

2026-01-29

Ramaphosa Orders Special Police Unit To Probe Madlanga Commission Allegations

2026-01-29

Volvo C70: 30 Years Of The Car That Changed The Way Volvo Looked

2026-01-29

Eskom and the Netherlands launch Grootvlei Climate Smart Horticulture Centre in Mpumalanga

2026-01-26

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Cartesian Capital Expands Investor Toolkits With JSE Listings

2026-01-20

Kili Technologies: Unlocking Africa’s Clean Energy Potential With Trusted Data

2026-01-19
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026

The crypto presale market in 2026 has seen dozens of projects compete for investor attention.…

Dutch Entrepreneurial Development Bank FMO Invests R340M In Lula To Expand SME funding In SA

2026-02-03

Paarl Mall Gets R270M Mega Upgrade

2026-02-02

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

Vodacom Reports Robust Q3 Growth, Driven By Diversification And Strategic Moves

2026-02-04

South Africa’s First Institutional Rand Stablecoin, ZARU, Launches

2026-02-03

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026

2026-02-07

Football Fans Can Share Their ‘Super Bowl Spread’  With The Chance To Win an NFL Jersey

2026-02-07

Why Traditional Banks Need Mobile Money Solutions to Survive the Next 5 Years

2026-02-07
Recent Posts
  • Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026
  • Football Fans Can Share Their ‘Super Bowl Spread’  With The Chance To Win an NFL Jersey
  • Why Traditional Banks Need Mobile Money Solutions to Survive the Next 5 Years
  • Spotify Brings Audiobooks to South Africa
  • Anjouan Corporate Services Reshapes Cross-Border Brokerage Licensing Strategy for UAE-Focused Firms
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.