EMV chips can be cloned, but not with only the information present on the mag stripe. EMVs function as a challenge-response system, meaning an EMV authorization is transactionary between the ATM/POS and the card based on a secret stored on the EMV. There are three stages in this process:
- Card Authentication - here the card authenticates itself to the ATM/POS
- Cardholder Verification - here the cardholder authenticates via PIN or signature (the card is not involved in this step)
- Transaction Authorization - where the transaction itself is done
Stages one and three present problems to our would-be skimmer. From the outset, the card has to authenticate itself to the machine. It does this by transmitting an RSA signature back to the machine over selected records.This signature is not going to be on the mag stripe. Once that's done, the transaction needs to be authorized. The ATM/POS sends the card the parameters to the transaction (amount, currency, date, etc.) to the card, which the card then returns signed with the secret, along with an ATC (a ticker that counts the transaction number) and an IAD (information specific to the card issuer). The ATM/POS sends this along to the bank for a green light for the transaction. By design, the secret isn't going to be stored on the stripe, and it would be impossible to store the ATC since that changes with each transaction.
Again, you could do a preplay attack on the chip, or you could take the chip apart and look at it under an electron microscope, but the magnetic stripe isn't going to be enough to mint new chips.