Topic > Global Payments Case Study - 942

According to some research, the Global Payments breach supposedly has its roots in accessing Track 1 and Track 2. Both Tracks 1 and 2 serve a separate purpose, but both contain enough information to clone a credit card. To access tracks 1 and 2 the criminals must have needed a password, so we can assume that Global Payment had weak passwords, which made the breach easier, or that the breach was carried out by an insider. Processors do not need to store magnetic stripe data, which is Track 1 and Track 2 data as mandated by payment networks. PCI also indicates this, but networks have additional rules on how these companies must operate when trading on their network. If the global payment indicated that track 2 data was stolen, then we can assume that they were storing data that was not supposed to or that the compromised data was taken in real time, meaning that other data and not just the track 2. This means that the authorization message, which contains more information than just your credit card number and expiration date, may have been compromised, such as security authentication