Okay, I’ll bite… most credit card fraud these days is done via online transactions using just the card number, expiration date and CVV (old, insecure, static card data).
When cards are copied to be used in person (which is much rarer as it is easier to get caught on cameras and arrested than on the internet through a VPN) it is to my knowledge ALWAYS by cloning the magstripe data to another card (for those playing at home - old, insecure, static card data). @DeviantOllam demonstrated this attack on The Modern Rogue youtube channel by copying a credit card to an old hotel key card. As of now, implanting magspoof devices has never been done.
I have NEVER seen evidence of a chip or contactless EMV card copied from a credible source online. This attack doesn’t exist. It relies on a private key being written to the card at factory and linked with a public key in their database. You can’t get the private key off the device, and without that you cannot pass the cryptographic challenges the terminal issues you on behalf of the bank. Transaction Declined. Thanks for playing.