20 million
GlobalPay, a leading financial technology payment processor, has disclosed a catastrophic data breach impacting an estimated 20 million customers. The breach, which occurred between January 15 and February 20, 2026, resulted from a sophisticated supply chain attack. Attackers compromised a third-party software vendor and used a malicious update to infiltrate GlobalPay's network. They then moved laterally to the card processing environment and installed data-scraping malware. The compromised data includes full names, credit card numbers, expiration dates, and CVV codes. The infamous cybercrime group ShinyHunters has claimed responsibility and is attempting to extort GlobalPay for $5 million. Mandiant has been engaged for forensic investigation.
The attack chain highlights the significant risk posed by third-party software dependencies:
T1195.001 - Supply Chain Compromise: Compromise Software Dependencies and Development Tools: The core of the attack, compromising a third-party vendor to attack the final target.T1078 - Valid Accounts: (Assumed) After initial access, attackers likely used legitimate but compromised accounts to move laterally.T1003 - OS Credential Dumping: Likely used to escalate privileges and move towards the card processing environment.T1040 - Exfiltration Over C2 Channel: The 20 million card records were exfiltrated to the attacker's servers.T1621 - Extortion: ShinyHunters is using the stolen data to extort GlobalPay.This is a devastating breach with far-reaching consequences. For the 20 million affected individuals, the exposure of full credit card details including CVV codes poses an immediate and high risk of financial fraud. For GlobalPay, the impact is multi-faceted: immense financial loss from regulatory fines (e.g., GDPR, PCI-DSS penalties), costs of investigation and remediation, and providing credit monitoring to 20 million people. The reputational damage will be severe, potentially leading to a loss of merchant customers and a decline in consumer trust. This incident serves as a powerful case study on the systemic risk of supply chain vulnerabilities in the financial sector.
D3-SBV: Service Binary Verification to ensure third-party software updates are legitimate and D3-UDTA: User Data Transfer Analysis to detect the exfiltration of sensitive cardholder data.Strictly segmenting the network could have prevented the attackers from pivoting from the compromised analytics system to the critical card processing environment.
Mapped D3FEND Techniques:
Running third-party software in a sandboxed environment would contain its activity and limit its ability to access other network resources.
Mapped D3FEND Techniques:
Enforcing strict code signing and signature verification for all software updates can prevent the installation of trojanized binaries.
Mapped D3FEND Techniques:
Applying the principle of least privilege to service accounts for third-party software would limit their ability to facilitate lateral movement.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats