> series: anatomy_of_a_breach —— part: 039 —— target: global_payments —— cards: 1,500,000 —— consequence: visa_delisted<span class="cursor-blink">_</span>_
In late March 2012, payment processor Global Payments disclosed that it had identified and self-reported unauthorised access to its processing system, resulting in the compromise of approximately 1.5 million payment card numbers. The breach had occurred between January and February 2012. Both Visa and MasterCard removed Global Payments from their lists of PCI DSS-compliant service providers — effectively banning the company from processing transactions for the two largest card networks until compliance could be re-established.
The breach was first reported by security journalist Brian Krebs, who noted the strong parallels with the Heartland Payment Systems breach of 2009 — another payment processor compromised through its transaction processing infrastructure. The financial impact to Global Payments included $94 million in breach-related costs, a 9% drop in share price on disclosure day, and the commercial damage of being publicly delisted by Visa. The breach reinforced that payment processors remain high-value targets — and that PCI DSS compliance at assessment time does not prevent breaches between assessments.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallGlobal Payments was the third major payment processor breach covered in this series, following Heartland (130 million cards, 2008) and RBS WorldPay ($9 million stolen, 2008). The pattern is consistent: payment processors handle enormous volumes of card data in transit, making them a concentrated target. A single breach yields millions of card numbers without the need to compromise individual merchants.
The Global Payments breach reinforced the central lesson of every payment processor compromise in this series: annual PCI DSS assessment is necessary but not sufficient. Security requires continuous monitoring to detect breaches between assessments, regular penetration testing to identify new vulnerabilities as they emerge, and vulnerability scanning to maintain patching discipline.
For any organisation that processes, stores, or transmits payment card data — from merchants to processors — our PCI DSS penetration testing provides the assessment. Cyber Essentials establishes the baseline controls. SOC in a Box provides continuous monitoring. And UK Cyber Defence provides incident response when a breach is detected.
Our <a href="/penetration-testing/pci-dss">PCI DSS penetration testing</a> goes beyond the compliance checkbox. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors between assessments.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call