> series: anatomy_of_a_breach —— part: 069 —— target: home_depot —— cards: 56,000,000 —— dwell_time: 5_months<span class="cursor-blink">_</span>_
On 8 September 2014, Home Depot confirmed that its payment systems had been breached, resulting in the theft of approximately 56 million payment card numbers and 53 million email addresses. The breach had been active from April to September 2014 — five months of undetected data exfiltration across 2,200 stores in the United States and Canada. The attack was first reported by security journalist Brian Krebs, who noted that the attackers used a variant of the same custom POS malware — BlackPOS — that had been deployed in the Target breach nine months earlier.
The parallels with Target were striking: both breaches began with stolen vendor credentials, both involved lateral movement from the vendor access point to the POS environment, both deployed custom malware to capture card data at the point of sale, and both went undetected for months. Home Depot's breach was actually larger than Target's in card volume (56 million vs 40 million) and lasted longer (five months vs three weeks). The total cost to Home Depot exceeded $179 million in settlements and remediation.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Home Depot breach occurred nine months after the Target breach was disclosed — and used the same attack methodology. The security community had published extensive analysis of the Target breach, the POS malware used, and the vendor access vulnerabilities exploited. Yet Home Depot fell to the same attack pattern, demonstrating that awareness of a threat does not automatically translate into protection against it.
The Home Depot breach is the clearest possible demonstration that knowledge without action is worthless. Every retailer in the world knew about the Target breach by January 2014. The attack methodology was public, the malware was analysed, and the defensive recommendations were clear. Nine months later, Home Depot fell to the same attack. The difference between knowing about a threat and being protected against it is implementation — tested, verified, monitored implementation.
Our PCI DSS penetration testing validates that POS security controls are implemented, not just documented. Infrastructure testing verifies vendor segmentation. Cyber Essentials mandates MFA and access controls. SOC in a Box for Retail monitors POS environments continuously. And UK Cyber Defence provides incident response when a POS compromise is detected.
Our <a href="/penetration-testing/pci-dss">PCI DSS testing</a> validates POS security. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> verifies vendor segmentation. <a href="https://www.socinabox.co.uk/sectors/retailers">SOC in a Box for Retail</a> monitors continuously.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call