December 29, 2016 By Rick M Robinson 2 min read

The U.S. was not an early adopter of chip-and-PIN credit cards, lagging behind major European countries and others. But more than a year after the official mandatory shift to this technology, the transition has reshaped most credit card transactions. As a result, the rate of credit card fraud is down sharply.

Catching Up With Chip-and-PIN Credit Cards

The compliance standard associated with these cards is known as Europay, MasterCard and Visa (EMV), after the card issuers that originally came up with it. The standard is now independently administered.

EMV became mandatory in the U.S. in October of 2015, at which point liability for fraudulent transactions using non-EMV cards shifted from banks to retailers. While most large retailers, which account for the majority of credit card sales, have adopted compliant card-reading technology, many smaller retailers have not yet shifted. That puts them at risk of fraud — and they could be left holding the bill for any monetary losses.

Chip-and-PIN credit cards contain a chip that communicates with EMV-capable card readers at the point of sale, generating a unique transaction code that makes fraud involving physical credit cards much more difficult.

The good news is that, a year after the shift in liability, chip-and-PIN credit cards are now widespread and used in most transactions. According to Arc, a study by MasterCard found that 88 percent of MasterCard-issued credit cards now contain the chips, and about 9 out of 10 cardholders use them. This represents a 38 percent increase since the new standard went into effect.

A Long Way to Go

Many retailers, however, continue to lag. MasterCard registered some 2 million EMV-compliant merchants, which represents about 33 percent of U.S. retailers. Some of the remaining two-thirds may not take MasterCard, but it’s clear that many retailers still have not adopted EMV-compliant card readers at their checkout stands.

That said, 1.3 million of the compliant merchants are described as “regional or local merchant locations,” representing a one-year increase of 159 percent. These merchants are making substantial progress toward compliance, even if they still have a long way to go.

The effect on fraud is striking. The level of fraud among compliant retail merchants is down by 54 percent, according to the MasterCard study. Meanwhile, the cost of fraud to noncompliant merchants increased by 77 percent in the period between April 2015 and April 2016.

As the reality of this divergence sinks in, retailers of all sizes will see a continuing incentive to adopt EMV technology to gain the full protection of chip-and-PIN credit cards.

Download the 2016 IBM X-Force Report on Security Trends in the Retail Industry

More from Fraud Protection

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today