Stephen Gates | September 10, 2025 | Blogs
Insurance companies don’t just protect homes, cars, and livelihoods. They safeguard enormous amounts of personal and financial data — making them prime targets for adversaries. The National Insurance Crime Bureau projects a 49% surge in identity theft-related insurance fraud in 2025, while synthetic identity fraud already costs the life insurance sector an estimated $30 billion annually, accounting for up to 85% of all cases.
For one large U.S.-based insurer, the wake-up call came not from regulators or an incident — but from their own development environment. When identities are the new perimeter and fraud is measured in billions, security leaders need proof that all environments can withstand a live attack.
That’s the idea behind Pentest Wednesday — a way of describing how organizations move from assumptions and paperwork to continuous validation and measurable risk reduction. For this insurer, it began with a single test of their development environment — and it reframed how they viewed identity security, developer environments, and third-party risk.
This insurer is one of the largest in its region, with hundreds of offices and a vast field presence. Thousands of employees, agents, and claims professionals serve hundreds of thousands of policyholders and their families, providing multi-line coverage across auto, home, farm, commercial, and life insurance.
The company has been a NodeZero® customer since 2022, running monthly pentests to keep pace with change. But Dev remained off-limits, with developers assuring leadership that it was isolated and low-risk. For years, that argument held — until a single Dev pentest changed everything. What it revealed inside this insurer wasn’t just a local issue — it reflected the systemic risks facing large insurers everywhere.
Large insurers operate at a scale where identity and data protection become existential challenges. With hundreds of offices, thousands of employees and agents, and services that span multiple lines of business, the attack surface is enormous.
Each line of business carries its own sensitive data:
Auto Insurance: driver’s licenses, vehicle registrations, accident reports, telematics data
Home Insurance: property records, mortgage details, appraisals, photos
Life Insurance: social security numbers, medical histories, beneficiaries
Farm Insurance: agricultural business data, land ownership, equipment valuations
Commercial Insurance: financial statements, business continuity plans, payroll info
Compliance frameworks may demand evidence of control effectiveness, but too often the proof comes in the form of paperwork. Audits can be passed, dashboards can show green, and questionnaires can be filed — yet none of it validates whether defenses will hold against a live attacker.
In this sector, the weakest link is almost always identity. Credentials can be stolen, weak, reused, or overprivileged. Third-party access expands exposure even further, as insurers often depend on vendors and contractors for claims, IT, and application development. It’s a systemic problem: adversaries don’t need to “hack in” when they can simply log in.
For insurers of this scale, the result is a dangerous gap between what leaders believe about their defenses and what is actually true in practice.
Their development environment had never been tested with NodeZero before. For years, it was treated as low risk and kept outside security’s oversight. But when the first pentest finally ran, the results reflected systemic risks — and made them impossible to ignore:
Executive credentials were also cracked and proven valid, but the actual pivot into Prod came from a service account compromised via the RAT — an account with Domain Admin privileges in the production domain. With millions of policyholder records and sensitive PII at stake, the exposure was undeniable.
The findings stopped the NodeZero op-review in its tracks. The security team paused the call with Horizon3.ai’s Customer Success team to bring in Compliance. Together, they replayed the attack path step by step: from weak passwords to domain admin, from Dev to Prod, from assumptions to proof.
NodeZero validated all of these risks safely, proving that continuous testing doesn’t have to come at the expense of uptime or stability. Since 2022, the same approach has been applied in production without disruption.
It also sparked a cultural change: purple teaming. Instead of treating Dev as off-limits, cybersecurity and developers began working together — validating vulnerabilities, testing fixes, and building stronger controls before anything reached production. By shifting validation left, Dev became a proving ground for resilience.
“The dev environment is the developers’, and the cybersecurity team is not allowed to touch it.”
Security Leader
“We thought our IAM controls were solid. Seeing how easily NodeZero moved laterally was a reality check.”
Security Analyst
Step 1: Cracked Credentials
Note: Attackers routinely run password-cracking campaigns in the background for weeks. Within days, NodeZero had harvested enough credentials to open the door.
Step 2: LSADump
Step 3: ActiveMQ Exploit
NodeZero Attack Path of ActiveMQ Exploitation -> Domain Compromise
Step 4: Privilege Escalation
Step 5: Prod Exposure
Not visible in scanners: Weaknesses like SMB Signing Not Required enabled NTLM relay and MITM attacks that traditional vuln scanners would have missed.
NodeZero Attack Path of SMB Signing Not Required -> Host Compromise
The insurer’s security strategy transformed from reactive monitoring to proactive validation. Key steps included:
Executives were shown evidence, not assumptions. NodeZero demonstrated how a service account compromised via a RAT escalated to Domain Admin in Prod — while also proving that executive credentials had been cracked and were valid, underscoring the risk at the highest levels of the organization.
Even during system change freezes — like major policy or platform rollouts — NodeZero kept validation running, ensuring resilience was never compromised.
“That shows executives good and bad. Look, this is how strong our defenses are. Currently, this is where we need to tighten it up. And that gives us latitude to get the other things in.”
Lead Cyber Security Infrastructure Compliance Analyst
Insurance organizations face adversaries skilled at exploiting identity weaknesses, compromised credentials, and third-party gaps. Dev and staging aren’t exceptions; they’re opportunities.
This insurer’s journey shows why Pentest Wednesday matters: it turns identity defense from reactive assumptions into proactive, continuously validated protection. The result wasn’t just technical improvement — it was organizational confidence and a stronger security culture.
For insurers, compliance and audits will always be part of the landscape. But as this story shows, they don’t prove whether identity controls, segmentation, or detection actually work.
This is where Identity Security Validation comes in. NodeZero doesn’t just find weak passwords or misconfigured accounts — it executes real credential-based attacks to prove how adversaries could harvest identities, escalate privileges, and move laterally across hybrid environments.
For this insurer, the outcome was clear: by validating identity defenses through NodeZero, security leaders could finally prove which controls worked, which didn’t, and how quickly attackers could turn Dev into a doorway to Prod.
Insurance thrives on trust. Policyholders depend on their carriers not only to cover losses but also to safeguard their personal data. Identity is the new perimeter — and third-party vendors are the new frontier of exposure.
Whether you manage policyholder systems, claims applications, or third-party vendors, your Dev and Prod environments may be more connected than you think. Pentest Wednesday gives you the evidence to close those paths before attackers exploit them.
Each week, I’ll be sharing new stories from the field — real-world examples of how organizations are using Pentest Wednesday to turn assumptions into evidence, and uncertainty into confidence.
Let our experts walk you through a demonstration of NodeZero®, so you can see how to put it to work for your organization.