Mobile payment card cloning possibilities


Nowadays we are observing very dynamic adoption of mobile contactless payments. These are systems provided by OS manufacturers (Android Pay, Apple Pay, Samsung Pay) as well as apps delivered by banks or 3rd party payment operators. According to Javelin Strategy & Research study, mobile proximity payments volume is growing exponentially and will reach $92 billion by 2019. Such a move from plastic payment card to its mobile equivalent will probably soon gather an attention of fraudsters. Moreover, we are observing a growing trend in rooting malware on an Android platform. According to Checkpoint research, only one rooting malware campaign last year was able to infect 10 million devices globally.


We strongly believe in proactive security. That’s why we decided to research possibilities of cloning mobile payment card data by modern malware and warn early adopters of HCE technology about potential risk and countermeasures. HCE is fully software implementation so it should be quite obvious that having root access to victim’s phone it would be possible to copy payment card data to another device, and use it to make a payment. Both Mastercard and Visa are aware of this risk and they are advising use of additional, external security measures to prevent similar attacks. Unfortunately, we have noticed that most of developers weren’t aware of this risk. Based on several assessments and lab experiments done by our team, we were able to demonstrate mobile payment card cloning in practice. We have cloned card data to other smartphone and used it to make payments.

Published PoC video shows such an attack scenario for Android Pay application, but we have proven that it is also possible for other payment applications delivered by various banks and payment institutions. General HCE cloning techniques are always similar, but there are significant differences between the attacked applications due to different countermeasures and obstacles for each of the researched applications, such as: device fingerprinting and integrity protections. Due to these differences, the cloning process is not universal and it is difficult to perform mass scale attack working out of the box for all implementations. But still, mobile malware could leverage cloning possibility and adapt to given payment application. Exactly in the same way as we are observing in case of internet banking malware.


Commonly used security measures as tokenization or limited use keys are not a sufficient in case of this attack scenario, because a cloned device fully impersonates the original one and will be able to obtain new keys. As a result – the attacker will be able to use cloned card data for multiple transactions below contactless “floor limit” of a single transaction.


It should be emphasized that our PoC was aimed only at verifying the possibility of cloning card data and making single, low amount transaction. We have not tested effectiveness of potential fraud detection mechanisms in case of higher volume of transactions.


Payment providers and banks deploying HCE technology in their mobile payment solutions should be aware of this risk, test their systems against card cloning attack scenario and take additional countermeasures, such as device scoring, malware detection, integrity protections and server side fraud detection.


Technical details will be discussed at Hack in The Box conference this Thursday in Amsterdam but without detailed instructions how to reproduce the attack. Meanwhile, we are publishing FAQ to minimize potential misunderstanding.

We will share general procedure steps to enable financial institutions testing their systems, but only If you can prove your identity and non-malicious intent. Please contact us for further details.



SecuRing is a team of experts who help achieve appropriate level of applications’ and systems’ security. Our mission is to provide support on each stage of IT systems development and maintenance with strong emphasis on application security issues. SecuRing is providing services such as: technical, “deep dive” application and infrastructure security testing, code review, definition of security requirements, project review, education. Part of our strategy is research of innovative attack and defense techniques. We publish research articles and regularly present conclusions  on leading IT security conferences worldwide, such as BlackHat, AppSec or Hack in The Box. SecuRing was established in 2003 and ever since we have delivered security services to leading players in financial industry (banks, insurance companies), telecom operators, software vendors as well as national government offices.

Stay tuned!

  • Articles and free security guides
  • Reports
  • Presentations and news from conferences around the world
Providing personal data is voluntary. We will send the newsletter until the consent is withdrawn (You can withdraw your consent at any time). Your data will be processed for a period specified in the Privacy Policy available at the following URL.
The Data Controller is SecuRing SJ with the registered office at ul. Kalwaryjska 65/6, 30-504 Kraków. I have the right to withdraw my consent at any time (by sending an e-mail to the address or by phone: +48 (12) 425 25 75). I have the right to access, rectify, erase or limit the processing of my personal data, the right to object, the right to file a complaint with the supervisory authority and right to transfer data. The legal basis for the processing of personal data is Article 6 (1) (a) of the General Data Protection Regulation (GDPR).
The Data Controller uses various IT solutions that allow for more efficient communication and cooperates with entities supporting it in its business and IT processes (i.e. these companies are data recipients/processors). Data are not transferred outside the European Economic Area. These companies have signed appropriate contracts for entrustment of personal data processing.
Thank you for subscribing.
Something went wrong.
Please contact us by phone.