Anatomy of a Breach

Anatomy of a Breach: Home Depot — 56 Million Cards Stolen Over Five Months via Custom POS Malware

> series: anatomy_of_a_breach —— part: 069 —— target: home_depot —— cards: 56,000,000 —— dwell_time: 5_months<span class="cursor-blink">_</span>_

Hedgehog Security 30 September 2014 13 min read

56 million cards. Five months. 2,200 stores. They used the same playbook as Target.

On 8 September 2014, Home Depot confirmed that its payment systems had been breached, resulting in the theft of approximately 56 million payment card numbers and 53 million email addresses. The breach had been active from April to September 2014 — five months of undetected data exfiltration across 2,200 stores in the United States and Canada. The attack was first reported by security journalist Brian Krebs, who noted that the attackers used a variant of the same custom POS malware — BlackPOS — that had been deployed in the Target breach nine months earlier.

The parallels with Target were striking: both breaches began with stolen vendor credentials, both involved lateral movement from the vendor access point to the POS environment, both deployed custom malware to capture card data at the point of sale, and both went undetected for months. Home Depot's breach was actually larger than Target's in card volume (56 million vs 40 million) and lasted longer (five months vs three weeks). The total cost to Home Depot exceeded $179 million in settlements and remediation.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Nine months after Target — the same attack, the same failures.

The Home Depot breach occurred nine months after the Target breach was disclosed — and used the same attack methodology. The security community had published extensive analysis of the Target breach, the POS malware used, and the vendor access vulnerabilities exploited. Yet Home Depot fell to the same attack pattern, demonstrating that awareness of a threat does not automatically translate into protection against it.

Vendor Credentials — Again
Like Target, the entry point was stolen vendor credentials. The lesson that third-party access must be secured with MFA, monitored, and segmented from payment systems had been stated clearly by every security firm that analysed Target. Home Depot had not implemented these controls. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses vendor segmentation and access controls.
POS Malware — Same Family
The attackers deployed a variant of BlackPOS — the same malware family used against Target. The malware captured card data from the memory of POS terminals during transaction processing. Our <a href="/penetration-testing/pci-dss">PCI DSS penetration testing</a> assesses POS environment security and the controls that prevent malware deployment.
Five Months Undetected
The breach ran from April to September 2014 — five months of active data theft across 2,200 stores without detection. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides 24/7 monitoring that detects the data exfiltration patterns, unusual network traffic, and malware command-and-control communications that POS breaches produce.
Self-Checkout Terminals Targeted
The malware was deployed specifically on self-checkout systems — terminals that process high volumes of transactions with minimal staff oversight. The self-checkout targeting demonstrated that attackers optimise for the highest data yield with the lowest detection risk. <a href="/blog/sector-under-the-microscope-retail">Our retail sector analysis</a> examines POS security in depth.

Knowing about Target's breach did not prevent Home Depot's.

The Home Depot breach is the clearest possible demonstration that knowledge without action is worthless. Every retailer in the world knew about the Target breach by January 2014. The attack methodology was public, the malware was analysed, and the defensive recommendations were clear. Nine months later, Home Depot fell to the same attack. The difference between knowing about a threat and being protected against it is implementation — tested, verified, monitored implementation.

Our PCI DSS penetration testing validates that POS security controls are implemented, not just documented. Infrastructure testing verifies vendor segmentation. Cyber Essentials mandates MFA and access controls. SOC in a Box for Retail monitors POS environments continuously. And UK Cyber Defence provides incident response when a POS compromise is detected.


Target was breached in November 2013. Home Depot was breached in April 2014. Have you tested yet?

Our <a href="/penetration-testing/pci-dss">PCI DSS testing</a> validates POS security. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> verifies vendor segmentation. <a href="https://www.socinabox.co.uk/sectors/retailers">SOC in a Box for Retail</a> monitors continuously.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles