A 'secure' PCI enclave
The PCI network and card processing applications were believed to be hardened, segmented, and compliant.
Identifying weaknesses beyond PCI-DSS compliance to secure a critical payment processing environment.
A financial services organisation operated a dedicated PCI network zone and several cloud-based applications for processing payment card data. The environment had been validated as compliant with the Payment Card Industry Data Security Standard (PCI-DSS), and the internal team believed it was well secured against attack. As part of their annual assurance process, Cyber Defence was engaged to perform a penetration test to validate the security of the environment and uncover any remaining risks.
What we uncovered demonstrated that compliance does not always equal security.
Challenge
The PCI network and card processing applications were believed to be hardened, segmented, and compliant.
The client requested an internal penetration test to validate secure handling of card data and identify any overlooked issues.
Our methodology mirrors attackers: start with low privileges and pivot through realistic organisational pathways.
The Cyber Defence penetration testing team arrived onsite with user-level access equivalent to a restricted employee—precisely the starting point a real attacker often has.
Initial inspection suggested the environment was well-designed: card data processed on isolated networks, hardened devices, encryption standards met, policies followed. Anyone reviewing only the PCI segment would likely consider it secure and compliant.
But attackers rarely restrict themselves to the PCI scope.
Our testers stepped outside the PCI-DSS boundary and analysed the larger network estate, immediately identifying:
• an outdated, forgotten server accessible to low-privileged users
• a blank administrator password — a critical oversight :contentReference[oaicite:1]{index=1}
• multiple systems sharing identical local accounts
• no monitoring in place for internal lateral movement
From this server alone, our team escalated privileges, accessed sensitive accounts, cracked several passwords, and pivoted deeper into the network. Within hours, we located credentials granting access to network devices and even the payment card servers themselves.
What began as minimal user access became full internal compromise of the client's 'fully secured' PCI environment.
Findings
A weakness in the client’s internal workflow placed the entire payment environment at risk, despite PCI compliance.
Forgotten servers, weak passwords, and shared accounts allowed rapid privilege escalation and lateral movement.
Attack paths from non-PCI systems to PCI-scoped servers had never been validated during previous audits.
Impact
Attackers could have gained access to systems that handled or supported payment card operations.
Failure to detect the weaknesses could have resulted in non-compliance, fines, or required reassessment.
Privilege escalation on core systems could lead to service outages or tampering with payment processes.
Based on the engagement results, Cyber Defence provided detailed recommendations on:
• segmentation and secure design of supporting systems
• credential hygiene and privileged access improvements
• legacy system lifecycle management
• logging and monitoring for internal lateral movement
• new operational protocols for administrators
These improvements collectively reduced risk far beyond the narrow scope of PCI-DSS compliance.
Outcome
Our findings revealed hidden weaknesses and allowed the client to secure their cardholder data processes end-to-end.
The client adopted strengthened administrative controls, reducing the likelihood of similar issues recurring.
The engagement demonstrated the importance of full-environment testing—not narrow compliance-driven scoping.
Takeaways
Ensure all stakeholders understand what is being tested and why.
Compliance testing and adversary simulation produce very different findings.
Ensure patches and known-good backups exist before test day—just in case.
Cyber Defence performs comprehensive penetration testing, red teaming, and secure architecture reviews for high-risk financial environments.
Speak to our offensive security team to discuss your requirements.