Loading...
Loading...
How nCrypt delivered quarterly PCI ASV scanning, a focused web and API pentest and a fraud-aware application review that drove a measurable drop in chargeback losses for a regional fashion retail platform. Client identifying details have been anonymised under the engagement non-disclosure agreement.
The client is a fashion-focused e-commerce platform headquartered in Malaysia and operating consumer storefronts in five ASEAN markets, with daily order volume in the high five figures and a monthly active customer base in the low millions. The business model depends on a mix of own-label inventory and a marketplace of third-party sellers, each with a separate payout flow.
Engineering runs as a single platform team in Kuala Lumpur with regional growth and fraud teams embedded in each market. The technology estate is built on a Node.js monolith fronted by a global CDN, with a small set of Go microservices handling payments, fraud scoring and seller payouts. Card data is tokenised by a third-party gateway, but the platform retains substantial PCI scope through its checkout-page hosting model.
The engagement was triggered by two converging pressures. PCI ASV scanning had been failing for two consecutive quarters, putting the merchant agreement with the acquiring bank at risk. At the same time, the fraud team was reporting a steady month-on-month rise in chargeback losses concentrated on coupon abuse and account-takeover scenarios.
The repeated PCI ASV scan failures had escalated into a written notice from the acquiring bank, with a clear timeline before merchant-account restrictions would begin to bite. Each failed scan was rooted in a CDN-edge misconfiguration that the platform team understood in principle but had not been able to remediate cleanly without risking customer-facing performance.
The fraud loss line was the second pressure. A growing share of chargebacks had been traced to coupon-engine abuse — fraud actors purchasing high-value items at near-zero prices through automated combinations of stacked promotions — and to a parallel rise in account-takeover fraud driven by credential-stuffing pressure from regional botnets. The fraud team had implemented behavioural scoring but was hitting diminishing returns without underlying application-logic fixes.
The marketplace dimension added complexity. Third-party sellers operated their own promotional campaigns, exposing the central coupon engine to logic that had not been designed for arbitrary external configuration. Seller-side fraud and buyer-side fraud shared a single technical attack surface that no previous assessment had treated as one engagement.
Finally, the platform had a non-negotiable release cadence around regional sale events including 11.11, 12.12 and the Hari Raya campaigns. Any engagement had to fit cleanly around peak-traffic windows and produce remediation guidance that the platform team could land between sale events without freezing the product roadmap.
nCrypt structured the engagement as a continuous programme with three workstreams. The PCI ASV workstream took on the quarterly scanning obligation directly, including the configuration work required to bring the CDN edge into line with PCI DSS v4.0 ciphers, headers and TLS settings. The first attestation pass landed inside eight weeks of engagement start.
The application workstream delivered a focused web and API pentest mapped to OWASP ASVS Level 2, with an explicit fraud-aware overlay developed jointly with the client's fraud team. Every flow that had appeared on a chargeback report was walked through with the engineers who owned it, and the resulting test cases ran against both the storefront and the seller-side coupon configuration surface.
The continuous-assurance workstream took over after the initial deep assessment. External attack-surface monitoring runs continuously against all five market domains, the PCI ASV cadence is anchored to the quarterly cycle, and a deeper application retest is scheduled twice a year to track residual risk on new feature launches.
Joint working sessions with the fraud team made the difference on the fraud-loss outcome. Rather than handing over a report, nCrypt's consultants paired with fraud analysts during the assessment, so that the technical findings landed in the backlog with chargeback-data context already attached. This compressed the time from finding to fix and gave the fraud team confidence to retire compensating rules that were no longer needed.
The promotion engine accepted client-supplied price deltas without revalidating against the canonical catalogue. Combined with weak rate limiting on checkout, this allowed bulk-fraud actors to purchase high-value items at near-zero prices through automated tooling.
The password-reset flow generated tokens with insufficient entropy and a long validity window. Combined with credential-stuffing pressure from regional botnets, this produced a measurable account-takeover loss line on the monthly fraud report.
The edge CDN was misconfigured to advertise legacy TLS ciphers and an out-of-policy HTTP header set, producing repeated PCI ASV scan failures that had been blocking quarterly attestation for two consecutive cycles.
Stored card-on-file tokens could be re-used from a freshly authenticated session on a new device with no additional challenge, allowing a determined attacker who had completed account takeover to immediately monetise stored payment methods.
An internal microservice intended for warehouse use had been exposed externally through an over-permissive API gateway rule, leaking real-time stock-level data that competitors had begun scraping at scale.
The first PCI ASV attestation passed inside eight weeks of engagement start, restoring the merchant agreement with the acquiring bank and removing the immediate revenue risk. The CDN configuration that had blocked two consecutive quarters was rebuilt against an explicit PCI-aligned baseline, with automated drift detection added to the release pipeline so that the same regression would not recur.
On the fraud line, chargeback losses fell by roughly three quarters within the first three months following remediation of the coupon-engine and account-takeover findings. The account-takeover share of total chargeback volume in particular was effectively eliminated once per-device binding was applied to stored payment methods and the password-reset token entropy was raised.
Twelve months on, the platform has retained nCrypt for a continuous-assurance retainer covering quarterly PCI ASV scanning, biannual application pentests and continuous external attack-surface monitoring across all five market domains. The fraud team reports that the working partnership between application security and fraud has become the model for how new product surfaces are launched.
Share your scope. We'll respond within 24 hours.
Share your scope. We'll respond within 24 hours.
Get a continuous PCI ASV programme combined with a fraud-aware application pentest, scoped to the markets you operate in.