Target Data Breach Explained: A Case Study

Target Data Breach Explained: A Case Study

  • author image
    • Josh Amishav
    • ·
    • Last updated Apr 07, 2026
    • ·
    • 8 Minute Reading Time

Learn what the Target data breach teaches about vendor risk and credential security.

• Stolen vendor credentials gave attackers network access for three weeks. Fazio Mechanical, a small HVAC contractor, had remote access to Target’s network with no segmentation between vendor systems and payment terminals. Limit and monitor every third-party connection.
• Target’s FireEye system flagged the malware twice. Nobody investigated the alerts. Detection without response is useless. Build playbooks so your team knows what to do when tools fire.
• The total cost exceeded $200 million in settlements, direct expenses, and lost sales. The CEO and CIO both resigned. Security failures carry personal consequences for leadership.
• The same attack pattern still works today. Third-party breaches have doubled since 2013, and stolen credentials remain the top initial access method. Monitor your vendors’ credential exposure, not just your own.

In late 2013, attackers stole payment card data from 40 million Target customers. Personal information from 70 million more was exposed too.

The total cost exceeded $200 million. But the breach didn’t start with some zero-day exploit. It started with stolen credentials from an HVAC vendor.

That attack pattern, a compromised vendor login used to reach a corporate network, still drives breaches today.

This case study breaks down how the Target data breach happened, what it cost, and what your security team can learn from it.

What Happened in the Target Data Breach?

The Target data breach of 2013 remains one of the most studied cyberattacks in retail history. A company with a $1.6 billion IT budget and security tools from FireEye got breached through an HVAC vendor’s stolen password.

A data breach occurs when unauthorized individuals access sensitive information they shouldn’t have. Breaches range from stolen payment cards to exposed employee credentials. The damage depends on what was taken and how fast you respond.

Attackers gained access to Target’s network in mid-November 2013. They used stolen credentials from Fazio Mechanical Services, a small HVAC contractor based in Sharpsburg, Pennsylvania. Once inside, they moved laterally until they reached point-of-sale systems across 1,797 stores.

Over three weeks, malware on those POS systems captured payment card data from every in-store transaction. About 40 million cards were compromised. Attackers also stole personal information from 70 million additional customers.

The breach wasn’t discovered by Target’s own team. Their FireEye deployment generated alerts about the malware. Nobody investigated. An external payment processor identified suspicious transactions and contacted Target in mid-December. By that point, attackers had been collecting card data for nearly three weeks.

Attack Timeline

  • Mid-November 2013: Attackers steal Fazio Mechanical credentials via phishing email
  • November 15-27: Attackers test access and move laterally through Target’s network
  • November 27: Malware installed on POS systems (Black Friday weekend)
  • November 30: FireEye generates first alerts about suspicious activity
  • December 2: FireEye generates second round of alerts. No investigation.
  • December 12: Department of Justice notifies Target of the breach
  • December 15: Target removes malware from POS systems
  • December 19: Target publicly discloses the breach
  • January 2014: Target confirms 70 million additional records compromised

How Did Attackers Get Into Target’s Network?

The entry point wasn’t a zero-day exploit or some rare vulnerability. It was a compromised vendor login.

A third-party data breach happens when attackers compromise a vendor or partner to reach their real target. Your security depends on your vendors’ security. If a contractor with network access gets phished, attackers can use those credentials to pivot into your systems.

The Fazio Mechanical Connection

Fazio Mechanical Services was a small HVAC contractor with about a dozen employees. They had remote access to Target’s network for electronic billing and contract submissions. Their security was minimal. Reports indicate they relied on a free version of Malwarebytes as their primary anti-malware tool.

Attackers sent phishing emails to Fazio employees and stole their login credentials. With a small company running consumer-grade security, the phishing campaign was straightforward.

From Vendor Portal to Payment Systems

With Fazio’s credentials, attackers entered Target’s network. The critical failure: Fazio’s access wasn’t isolated from sensitive systems. There was no network segmentation between the vendor portal and Target’s internal environment.

Attackers moved laterally from the vendor-accessible systems to Target’s internal network and eventually reached the POS environment. They installed RAM-scraping malware called BlackPOS (also known as Kaptoxa) on checkout terminals across 1,797 stores.

How BlackPOS Worked

BlackPOS was designed specifically to steal payment card data from retail POS systems. When a customer swiped their card, the terminal briefly held the card data in memory (RAM) before encrypting it. BlackPOS captured the data during that unencrypted moment.

The malware then staged stolen card data on compromised internal servers within Target’s network. From there, it was exfiltrated to external FTP servers the attackers controlled. The entire pipeline ran silently for weeks.

What Data Was Stolen in the Target Breach?

The breach exposed two distinct sets of data.

40 million payment card records including card numbers, expiration dates, and CVV codes. This data came directly from the BlackPOS malware running on checkout terminals. Every in-store card transaction during the three-week window was captured.

70 million customer records including names, mailing addresses, and email addresses. This data came from a separate part of Target’s systems and affected customers regardless of whether they used a card during the breach window.

Combined, the breach affected up to 110 million people. The stolen card data appeared on dark web markets within days, sold in batches by geography and card type. Cards from certain regions commanded higher prices because they were fresher and less likely to have been canceled.

How Much Did the Target Data Breach Cost?

The financial damage extended years beyond the initial incident. Target spent over $200 million in total.

Settlement costs:

  • $18.5 million multi-state settlement with 47 attorneys general
  • $10 million settlement with affected customers
  • $67 million settlement with Visa
  • $39 million settlement with banks and credit unions

Direct expenses:

  • $61 million in breach-related costs including forensic investigation and legal fees

Business impact:

  • Q4 2013 revenue declined 6.6% year over year
  • Q4 2013 net earnings fell 46% (driven by both the breach and Target Canada losses)
  • Both CIO Beth Jacob and CEO Gregg Steinhafel resigned
  • Customer trust declined and took years to rebuild

For context, the average data breach costs $4.44 million according to IBM’s 2025 Cost of a Data Breach Report. Target’s breach cost roughly 45 times that. The scale of the breach turned it into a corporate crisis rather than just a security incident.

How Did Target Respond to the Breach?

Target’s initial response was slow, but the long-term security overhaul was substantial.

Immediate Response

Target publicly disclosed the breach on December 19, 2013, six days after the DOJ notification. They offered free credit monitoring to affected customers and launched a forensic investigation with external security firms. They cooperated with law enforcement and regulators throughout.

The delayed detection was the biggest failure. FireEye had flagged the malware on November 30 and again on December 2. Target’s security team in Bangalore saw the alerts. The alerts were sent to the Minneapolis team. Nobody acted. The malware ran for two more weeks before an external payment processor flagged the suspicious transactions.

Long-Term Security Reforms

After the breach, Target made significant changes:

New security leadership. Target hired Brad Maiorino from General Motors as their new CISO, the first time the company had a dedicated CISO role.

Cyber Fusion Center. Target built a dedicated threat monitoring center to centralize security operations and ensure alerts don’t go uninvestigated again.

EMV chip rollout. Target accelerated adoption of chip-and-PIN technology for their REDcard products and installed new payment terminals in all stores. Chip cards are harder to clone than magnetic stripe cards, which is what BlackPOS was designed to skim.

Network segmentation. Target segmented their network to prevent lateral movement between vendor-accessible systems and critical payment infrastructure. This was the control that would have prevented the breach entirely.

Increased security budget. Target significantly increased cybersecurity spending and expanded security training across the company.

Target’s breach response became a widely studied example of what to improve. The biggest lesson from the response: having security tools deployed isn’t enough. You need people and processes ready to act when alerts fire.

What Can Your Security Team Learn from the Target Breach?

The Target breach happened in 2013, but the attack pattern hasn’t changed. The Verizon DBIR consistently names stolen credentials as the top initial access method. Third-party breaches have doubled since then. Here’s what still applies today.

Monitor and Limit Vendor Access

Fazio Mechanical had broader access than they needed. Your vendors should only reach the specific systems required for their work. Every vendor with network access is a potential entry point. Treat vendor credentials with the same scrutiny you apply to employee accounts.

Review vendor permissions regularly and use third-party risk management practices to reduce your exposure. Pay special attention to small vendors. They’re often the weakest link because they lack dedicated security teams.

Segment Your Network

If Target had isolated their POS environment from the general network, attackers couldn’t have pivoted from vendor access to payment systems. Network segmentation contains breaches. Even when attackers get in, segmentation limits what they can reach.

Act on Security Alerts

Target’s FireEye deployment detected the breach. Twice. The team didn’t respond either time. Build response playbooks for every alert type. Run tabletop exercises so your team knows exactly what to do when tools flag suspicious activity. An alert with no response is the same as no alert.

Watch for Stolen Credentials

The breach started with a compromised vendor account. Credential monitoring catches exposed passwords before attackers use them. If Target had detected Fazio’s compromised credentials on criminal markets, they could have revoked access before the attack began.

Build and Test Your Incident Response Plan

Target’s delayed response made everything worse. A tested incident response plan ensures your team acts fast when it counts. The NIST Cybersecurity Framework provides a solid starting point for building one.

Conclusion

The Target data breach started with one vendor’s stolen credentials. Attackers used that access to install malware on 1,797 stores’ payment terminals and compromise tens of millions of customer records.

The key takeaways for your team:

  • Limit vendor access and isolate it from critical systems
  • Respond to alerts when your security tools flag activity
  • Monitor for leaked credentials through dark web monitoring before attackers exploit them
  • Test your incident response plan before you need it

Stolen credentials are still the most common way attackers get in. Find exposed credentials fast and reset them faster.

Detect leaked credentials before attackers use them. Book a demo to see how Breachsense monitors the dark web for your company’s stolen credentials.

Target Data Breach FAQ

The breach was active from November 27 to December 15, 2013. Attackers had access for about three weeks before Target removed the malware. An external payment processor spotted the suspicious activity first.

About 40 million payment card records were stolen. An additional 70 million customers had personal information like names and addresses exposed.

Attackers stole credentials from Fazio Mechanical, an HVAC vendor with network access. They used those credentials to enter Target’s network and move laterally to the point-of-sale systems.

The total cost exceeded $200 million. That includes an $18.5 million multi-state settlement and $61 million in direct expenses. Revenue declined 6.6% in Q4 2013 and the reputational damage lasted years.

Evidence pointed to attackers in Eastern Europe. A Latvian national received a 14-year sentence for running a counter-antivirus service that helped the attackers test their malware against security tools before deploying it.

Third-party vendor access is the biggest takeaway. The breach also proved that network segmentation and credential monitoring aren’t optional for large companies.

Related Articles