Mastercard Tokenization Vulnerability Exposed in Brute Force Attack

bunq discovered a critical vulnerability in Mastercard's tokenization system that allowed attackers to brute-force credit card details through a major retail platform, leading to fraudulent PayPal transactions. Mastercard has confirmed the flaw and is implementing security enhancements.

mastercard-tokenization-vulnerability-brute-force
Facebook X LinkedIn Bluesky WhatsApp
de flag en flag es flag fr flag nl flag pt flag

Major Security Flaw in Mastercard's Tokenization System

Dutch digital bank bunq has uncovered a critical vulnerability in Mastercard's Digital Enablement Service (MDES) tokenization process that allowed attackers to brute-force credit card details through a large global retail platform. The security breach, discovered on August 19, 2025, represents one of the most sophisticated payment system vulnerabilities in recent years.

How the Attack Worked

Cybercriminals exploited weaknesses in Mastercard's card tokenization infrastructure by flooding the system with massive volumes of card data combinations. The attackers systematically tested Primary Account Numbers (PANs) and expiration dates in rapid succession, taking advantage of insufficient brute-force protection mechanisms at both merchant and Mastercard levels.

Once valid PAN/expiry date combinations were confirmed through the tokenization process, fraudsters immediately leveraged these compromised credentials for low-value payment attempts through PayPal merchant accounts. This strategic approach allowed them to bypass standard security measures including Card Verification Code (CVC) checks and 3D Secure (3DS) authentication protocols in regions where these protections aren't mandatory.

Immediate Response and Mitigation

bunq's advanced monitoring systems detected the malicious activity early and immediately reported the vulnerability to Mastercard through responsible disclosure channels. Mastercard confirmed the security flaw and has initiated comprehensive measures to secure its tokenization infrastructure.

The affected global retail platform has been notified about the misuse of their systems, and all impacted bunq users have been fully reimbursed. As a precautionary measure, bunq has issued new cards to affected customers to prevent potential future abuse.

Industry-Wide Implications

This incident highlights the evolving sophistication of payment system attacks and the critical importance of robust security protocols in digital payment infrastructure. Tokenization, while generally considered secure, requires continuous monitoring and adaptive security measures to prevent exploitation.

Financial institutions and payment processors worldwide are reviewing their tokenization security protocols in light of this discovery. The incident serves as a stark reminder that even established security frameworks require constant vigilance and improvement.

Related

password-manager-security-flaws-encryption-vulnerabilities
Technology

Password Manager Security Flaws: Zurich Study Reveals Zero-Knowledge Encryption Vulnerabilities

ETH Zurich researchers discovered 25 security vulnerabilities in major password managers (Bitwarden, LastPass,...

outlook-security-breach-passwords-2026
Technology

Outlook Security Breach 2026: 4,000+ Passwords Stolen via Malicious Add-in

Over 4,000 Outlook users had passwords stolen via hijacked AgreeTo add-in in February 2026. First malicious Outlook...

eu-stock-exchange-supervision-esma-2026
Financial

EU Central Stock Exchange Supervision: 6 Nations Back ESMA Expansion | Capital Markets Guide

Germany, France, Italy, Spain, Poland & Netherlands push for centralized EU stock exchange supervision under ESMA by...