Anatomy of a Breach

Anatomy of a Breach: Global Payments — 1.5 Million Cards and a Visa Delisting

> series: anatomy_of_a_breach —— part: 039 —— target: global_payments —— cards: 1,500,000 —— consequence: visa_delisted<span class="cursor-blink">_</span>_

Hedgehog Security 31 March 2012 11 min read

1.5 million cards. Delisted by Visa.

In late March 2012, payment processor Global Payments disclosed that it had identified and self-reported unauthorised access to its processing system, resulting in the compromise of approximately 1.5 million payment card numbers. The breach had occurred between January and February 2012. Both Visa and MasterCard removed Global Payments from their lists of PCI DSS-compliant service providers — effectively banning the company from processing transactions for the two largest card networks until compliance could be re-established.

The breach was first reported by security journalist Brian Krebs, who noted the strong parallels with the Heartland Payment Systems breach of 2009 — another payment processor compromised through its transaction processing infrastructure. The financial impact to Global Payments included $94 million in breach-related costs, a 9% drop in share price on disclosure day, and the commercial damage of being publicly delisted by Visa. The breach reinforced that payment processors remain high-value targets — and that PCI DSS compliance at assessment time does not prevent breaches between assessments.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Payment processors: the recurring target.

Global Payments was the third major payment processor breach covered in this series, following Heartland (130 million cards, 2008) and RBS WorldPay ($9 million stolen, 2008). The pattern is consistent: payment processors handle enormous volumes of card data in transit, making them a concentrated target. A single breach yields millions of card numbers without the need to compromise individual merchants.

PCI DSS Compliance ≠ Security
Global Payments was PCI DSS compliant at its last assessment. The breach occurred between assessments. As with Heartland, this demonstrates that compliance is a point-in-time snapshot, not a continuous guarantee. Our <a href="/penetration-testing/pci-dss">PCI DSS penetration testing</a> tests real-world exploitability, and <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides the continuous monitoring between assessments.
Visa Delisting: Commercial Devastation
Being removed from Visa's compliant processor list is a commercial catastrophe for a payment processor. It signals to merchants and banks that the processor cannot be trusted with card data. The reputational and financial damage extended far beyond the $94 million in direct costs.
Market Impact: Immediate
Global Payments' share price dropped 9% on the day of disclosure. The market's immediate reaction reflected the commercial reality: payment processors that suffer breaches lose the trust that their entire business depends on.
Self-Reporting Mattered
Global Payments self-reported the breach — it was identified internally before external disclosure. This proactive approach, while not preventing the breach, demonstrated the value of internal monitoring and detection capabilities. Organisations with <a href="https://www.socinabox.co.uk">SOC monitoring</a> are more likely to identify breaches internally rather than learning about them from Visa or the press.

Continuous testing, continuous monitoring.

The Global Payments breach reinforced the central lesson of every payment processor compromise in this series: annual PCI DSS assessment is necessary but not sufficient. Security requires continuous monitoring to detect breaches between assessments, regular penetration testing to identify new vulnerabilities as they emerge, and vulnerability scanning to maintain patching discipline.

For any organisation that processes, stores, or transmits payment card data — from merchants to processors — our PCI DSS penetration testing provides the assessment. Cyber Essentials establishes the baseline controls. SOC in a Box provides continuous monitoring. And UK Cyber Defence provides incident response when a breach is detected.


Three payment processors breached in this series. All were PCI compliant. Have you tested beyond compliance?

Our <a href="/penetration-testing/pci-dss">PCI DSS penetration testing</a> goes beyond the compliance checkbox. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors between assessments.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles