Have you ever wondered how your Debit card works when you put it into an ATM machine or POS, and what small steps you can take to upgrade your cards to be secure from cloning & fraud.
We ease to enter in the era of Smart Technologies, smart phones, smart homes, smart cars, and of course, smart cards. So, do we need to add this in our cards because everything has the word ‘Smart’, or do we really need our cards to be smart?
Magnetic Strip on the back of the cards can be easily cloned or skimmed.
Magnetic Strip stores the data into tracks. There are up to three tracks on magnetic strip, known as tracks 1, 2, and 3. Track 3 is virtually unused by the major worldwide networks.
Track 1 and 2 are used for processing electronic payments.
Components of Track 1
|PAN||4300 1234 4321 3232|
|Cardholder’s First name||Abhishek|
|Cardholder’s last name||Agrawal|
Components of Track 2
|PAN||4300 1234 4321 3232|
How Cloning Is Achieved
The biggest problem with a Magnetic card is that the data is static, making it easier for fraudsters to lift your information and clone it onto a new card. In fact, there’s something called a skimmer — which they can get or make for as little as Rs 5000 — that can do this pretty easily.
Cards can be cloned using a system called skimming, in which the cloning device is perhaps concealed in the pockets of the person you’re paying – or in extreme situations, attached to the payment machine.
The information from the magnetic strip on your card is then copied and the PIN is observed or recorded as it is entered for payment. With your card details are captured, they can be entered online or programmed into a brand new card which the thieves will then use, charging their purchases to your account.
You’re probably thinking that the nice girl in your local supermarket or takeaway wouldn’t dream of cloning your card, and you would probably be right and … in most cases, but there are many other ways to copy or hack your sensitive data from POS terminal or merchant systems, even just knowing the Track 2 data is enough to make the fraud. The rate of ATM fraud is also getting high where the machine is bugged with skimmer to records the data on Magnetic strip.
So How Chip Protects Us
A chip also holds a secret number. However, it is securely embedded in the chip. When you use the card, the chip performs a public key operation that proves it knows this secret number. However, it never reveals the secret number. If you put a chipped card in a bad guy’s machine, they can impersonate you for that one transaction, but they cannot impersonate you in the future.
The data on chip cards is constantly changing, making it extremely hard to isolate and extract. To rip it off, someone would have to get into the physical chip circuit and manipulate things to get your bank information. Not only is this level of data surgery really difficult, but it also requires a set of high-tech equipment that can cost north of $1 million. That’s probably not the kind of cash your average fraudster has handy.
The chip carries out a cryptographic operation on data passed to it that requires knowledge of the key that is strongly protected within the chip – so an attacker cannot easily copy the card.
The magnetic strip contains the exact information used to identify the card. The chip holds a piece of information that it doesn’t share, but that it can use to prove it has that information.
Thus, a magnetic stripe is dumb and can be copied, but since the chip doesn’t give out its secret, a vendor can’t simply copy it when you use it.
A magnetic stripe says, ”I’m credit card XYZ.” when the point of sale asks the number. With a chip, the point of sale says “what is your response to this random value?” and the chip gives a response that the point of sale can validate, but since the next point of sale will use a different random value, the response is useless to a thief.