GlobalPay Supply Chain Attack Exposes 20 Million Credit Cards; ShinyHunters Claims Responsibility

Payment Processor GlobalPay Discloses Massive Data Breach Affecting 20 Million Customers via Supply Chain Attack

CRITICAL
February 23, 2026
4m read
Data BreachSupply Chain AttackCyberattack

Impact Scope

People Affected

20 million

Industries Affected

FinanceRetail

Related Entities

Threat Actors

Organizations

MandiantFBI

Other

GlobalPay

Full Report

Executive Summary

GlobalPay, a leading financial technology payment processor, has disclosed a catastrophic data breach impacting an estimated 20 million customers. The breach, which occurred between January 15 and February 20, 2026, resulted from a sophisticated supply chain attack. Attackers compromised a third-party software vendor and used a malicious update to infiltrate GlobalPay's network. They then moved laterally to the card processing environment and installed data-scraping malware. The compromised data includes full names, credit card numbers, expiration dates, and CVV codes. The infamous cybercrime group ShinyHunters has claimed responsibility and is attempting to extort GlobalPay for $5 million. Mandiant has been engaged for forensic investigation.

Threat Overview

  • Victim: GlobalPay, a financial payment processor.
  • Threat Actor: ShinyHunters.
  • Attack Vector: Supply chain attack. Attackers compromised a third-party data analytics software vendor and pushed a malicious update.
  • Impact: Theft of approximately 20 million credit card records, including full card details (PAN, expiry, CVV) and customer PII.
  • Timeline: The breach occurred between January 15, 2026, and February 20, 2026.
  • Extortion: ShinyHunters is demanding a $5 million ransom and has leaked a sample of the data on a dark web forum.

Technical Analysis

The attack chain highlights the significant risk posed by third-party software dependencies:

  1. Supply Chain Compromise: The attackers first breached a smaller software vendor that supplies a data analytics tool to GlobalPay.
  2. Malicious Update: ShinyHunters embedded a malicious script (loader) into a legitimate software update for the analytics tool.
  3. Initial Access: When GlobalPay installed the trojanized update on its systems, the malicious script executed, giving the attackers a foothold in GlobalPay's internal network.
  4. Lateral Movement & Privilege Escalation: The attackers used their initial access to pivot from the analytics environment to the highly sensitive card processing environment.
  5. Data Theft: Custom malware was deployed within the processing environment to scrape card data in transit (RAM scraping) or from logs.
  6. Exfiltration & Extortion: The stolen data was exfiltrated to attacker-controlled infrastructure, and the group then claimed responsibility and issued their ransom demand.

MITRE ATT&CK TTPs

Impact Assessment

This is a devastating breach with far-reaching consequences. For the 20 million affected individuals, the exposure of full credit card details including CVV codes poses an immediate and high risk of financial fraud. For GlobalPay, the impact is multi-faceted: immense financial loss from regulatory fines (e.g., GDPR, PCI-DSS penalties), costs of investigation and remediation, and providing credit monitoring to 20 million people. The reputational damage will be severe, potentially leading to a loss of merchant customers and a decline in consumer trust. This incident serves as a powerful case study on the systemic risk of supply chain vulnerabilities in the financial sector.

Detection & Response

  • Software Integrity Checks: Implement file and code integrity monitoring for all third-party software updates before deployment. Hashing and signature verification can detect unauthorized modifications.
  • Egress Traffic Analysis: Monitor for anomalous outbound traffic from internal servers. A large, unexpected data transfer from a server running an analytics tool should be a major red flag.
  • Memory Analysis: On critical servers within the card processing environment, perform periodic memory forensics to detect memory-scraping malware that might not write to disk.
  • D3FEND: Employ D3-SBV: Service Binary Verification to ensure third-party software updates are legitimate and D3-UDTA: User Data Transfer Analysis to detect the exfiltration of sensitive cardholder data.

Mitigation

  1. Third-Party Risk Management: Implement a robust vendor security assessment program. Scrutinize the security practices of all software suppliers, especially those whose tools run in sensitive environments.
  2. Network Segmentation and Isolation: The analytics tool should have been running in a highly isolated network segment with no direct path to the card processing environment. Strict firewall rules should have prevented the pivot.
  3. Principle of Least Privilege: The service account running the third-party software should have had minimal necessary permissions, preventing it from accessing other network segments.
  4. Application Sandboxing: Run third-party applications in sandboxed environments to contain their activity and prevent them from accessing resources outside their intended scope.
  5. Data Loss Prevention (DLP): Implement DLP solutions at network egress points to detect and block the unauthorized exfiltration of structured data, such as credit card numbers.

Timeline of Events

1
January 15, 2026
The period of unauthorized access to GlobalPay's card processing environment begins.
2
February 20, 2026
The period of unauthorized access ends.
3
February 23, 2026
GlobalPay publicly discloses the data breach and ShinyHunters claims responsibility.
4
February 23, 2026
This article was published

MITRE ATT&CK Mitigations

Strictly segmenting the network could have prevented the attackers from pivoting from the compromised analytics system to the critical card processing environment.

Mapped D3FEND Techniques:

Running third-party software in a sandboxed environment would contain its activity and limit its ability to access other network resources.

Mapped D3FEND Techniques:

Enforcing strict code signing and signature verification for all software updates can prevent the installation of trojanized binaries.

Mapped D3FEND Techniques:

Applying the principle of least privilege to service accounts for third-party software would limit their ability to facilitate lateral movement.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachSupply Chain AttackShinyHuntersGlobalPayCredit CardFinancial

📢 Share This Article

Help others stay informed about cybersecurity threats