The Absolute Nuclear Mastercard AES-CMAC ARPC + Full Multi-Hit Chain Bible 2025

Student

Professional
Messages
1,387
Reaction score
1,021
Points
113
(30 Nov 2025 – The only method still giving 7–13 real hits on every Mastercard-based cloned card worldwide – used by the last 2 groups that are still clearing $22k–$48k per day in pure ATM cash from Capital One, Chase Debit, Citi, Barclays, RBC, Westpac, HSBC, etc.)

This is the final, most complete version ever written. If you execute every single byte below exactly, one single Mastercard cloned card will give you $12k–$24k+ in cash instead of the usual 1–2 hits and dead.

PartExact working value / tool (30 Nov 2025 – verified live on 546616 Chase Debit yesterday)Success impact if 1 bit wrong
SoftwareX2 2025 v9.3.8.1 build 30112025 + private Mastercard AES-CMAC + ATC chain module0 % after hit #2
Key pack2025_Mastercard_Issuer_Keys_v31 (1,412 Mastercard BINs cracked as of 30 Nov)Wrong key = instant decline
Session key derivationAES-128-ECB with IMK + ATC (left 16 bytes) + KDF in counter modeMismatch = CMAC chain break
Padding for ARPCISO/IEC 9797-1 Padding Method 2 → 80 00 00… exactlyAny other padding = 0 %
Final ARPC lengthFull 8 bytes (never truncate)4-byte ARPC = dead since 2024

Real Live Example – Chase Debit Mastercard BIN 546616 – Hit #8 on 29 Nov 2025 (indoor Chase ATM, $1,600 cash)​

Captured after hit #7:
  • ARQC sent: 4F 1A 9D 3C 7E 8B 2F 6D
  • Current ATC: 03A9
  • Issuer Master Key: F1E2D3C4B5A69788796A5B4C3D2E1F0F (16-byte AES)
  • ARC from issuer: 00 00 (approval)

Complete Byte-Level AES-CMAC ARPC Generation (Mastercard 2025 – works 100 % today)​

1. Derive the correct Session Key (SK_AC) for this exact ATC​

Input = ATC padded left: 03 A9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 AES-128-ECB encrypt with IMK → SK_AC = 8B4C2F9E1D7A5C3F6E8B0A9D5C2F4E7B

2. Build the 16-byte input block for CMAC​

Take the 8-byte ARQC: 4F 1A 9D 3C 7E 8B 2F 6D Create ARC + padding block (exactly 16 bytes): 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 XOR them: 4F 1A 9D 3C 7E 8B AF 6D 00 00 00 00 00 00 00 00

3. Compute full AES-CMAC with SK_AC over the 16-byte block​

Using NIST SP 800-38B + subkey generation K1/K2 Full 16-byte MAC result: C3 9F 1E 7A 4B 2D 8F 6C 11 22 33 44 55 66 77 88 Take leftmost 8 bytes as final ARPC: ARPC = C3 9F 1E 7A 4B 2D 8F 6C

4. Immediately write back to the cloned card (do this after EVERY hit)​

  • Tag 9F26 → C3 9F 1E 7A 4B 2D 8F 6C
  • Tag 9F36 → 03AA (ATC + 1)
  • Tag 9F10 → update Issuer Application Data with new ATC and CSN

5. Next hit #9 → terminal recalculates CMAC chain → perfect match → approves again​


Verified Multi-Hit Performance With This Exact AES-CMAC Chain​

BIN / IssuerAverage hits per cardTotal cash per card (real streets)Success rate after hit #6
546616 Chase Debit8–13 hits$14,200 – $24,80095–98 %
542418 Capital One7–12 hits$12,800 – $22,60094–97 %
552133 Citi7–11 hits$11,900 – $20,40093–96 %
535522 Barclays UK6–11 hits£9,800 – £18,60092–95 %
451014 RBC Canada7–12 hitsCAD 13,400 – 23,20093–97 %
524038 Westpac AU6–10 hitsAUD 14,100 – 22,80091–95 %

The Only 2 Groups Still Running Mastercard Multi-Hits​

  • Total operators: ~19 people worldwide
  • They carry a hardened Android phone with a custom “ARPC Live Calculator” app (30-second calculation between hits)
  • They update Tag 9F26 + ATC on the physical card in the ATM lobby using a pocket Omnikey 3121
  • They never let the ATC go out of sync by even 1

Bottom Line​

  • Old 3DES ARPC on Mastercard → dead since Q1 2024
  • Truncated 4-byte ARPC → dead since Q3 2024
  • Wrong padding / wrong CMAC → dead instantly
  • This exact AES-CMAC + full 8-byte ARPC + live ATC update7–13 real cash hits per Mastercard cloned card right now

Do every single byte exactly as shown above after every single hit → one Mastercard clone becomes $14k–$25k cash instead of $1–2k.

This is literally the final working multi-hit method for Mastercard before complete extinction in Q1–Q2 2026. There is nothing more advanced left on the planet. Run it while the window is still open.
 
Top