Throwback to the Target Hack: How It Happened, and Lessons Learned….We Learned Lessons, Right?
The December 2013 Target hack remains one of the most infamous data breaches in cybersecurity history. The hackers stole 40 million credit card numbers, got the PII (Personal Identifiable Information) of 70 million people, cost Target upwards of $200 million, and ruined Christmas for probably every single person working in Target’s IT department. The breach not only tarnished Target’s reputation but also impacted several other sectors, highlighting the ripple effects of large-scale cyberattacks. Financial institutions faced increased costs for reissuing millions of compromised cards, while consumers dealt with heightened anxiety over identity theft and fraud. The breach also served as a wake-up call for retailers and businesses worldwide, prompting many to reevaluate their cybersecurity practices and adopt more robust systems to safeguard sensitive data. Ultimately, it underscored the critical importance of proactive cybersecurity measures in an increasingly interconnected world.
What the Hack Happened
The breach began when attackers targeted a third-party vendor that had legitimate access to Target’s network. The vendor, Fazio Mechanical Services, was a Pennsylvania-based HVAC (heating, ventilation, and air conditioning) company that provided maintenance services to Target.
Attackers sent a phishing email to Fazio employees, and one unfortunate soul fell for it. That’s a point that deserves some emphasis – it only takes one person, one click, in one unguarded moment, to give the bad actors a way in.
The laptop was protected with the free version of Malwarebytes – an excellent tool that scans for and eliminates malware when initiated by the user. The version you pay for – that actually gets appropriately licensed for corporate use – has a real-time scanner that probably would have caught the issue, because the malware installed, called Citadel, was pretty well-known.
Network Infiltration
Using the stolen credentials from Fazio Mechanical Services, the attackers got access to a Target-hosted web service dedicated to outside vendors. They uploaded a file that allowed them to install a web shell to execute commands on the hosting server. Some call this a vulnerability, but there are lots of legitimate reasons a web application would let you upload files – invoices, for example – and while it should ideally block executables, it’s easy enough to disguise them.
They used a Pass-the-Hash attack to get domain admin credentials, and then the network was their playground. They went looking for database servers, and they found them – to the tune of 70 million records of PII (Personally Identifiable Information.)
But here’s a fun fact – know what those databases did not contain? Credit card numbers! Because Target’s data was PCI-DSS compliant, there was no financial info stored on their database servers.
Deployment of Malware & Exfiltration of Data
Having been foiled in their scheme by Target’s PCI-DSS compliance, the hackers moved on to plan B (or what might have been plan A all along, we don’t really know) – infiltrate the PoS (Point-of-Sale) servers and capture credit card data in real-time. They did this using malware called Kaptoxa, which would scrape the machine’s memory and store anything that looked like a credit card number in a file. Then, the malware would periodically transfer that file to another server, which would transfer it back to the hackers via FTP.
If you’ve been following along so far, one thing that may have stuck out to you was how the attackers were able to wander through the network, accessing pretty much whatever they pleased. This is why standard security procedures – like role-based access control and network segmentation, are so important.
Note: There’s a very thorough deep-dive about the hack here, including all of the tools, protocols, and technology used if you want to geek out.
Target’s Security Posture Before the Breach
You might think that Target had pretty poor security before the breach, but that was surprisingly (and alarmingly) not true. They had a security team of over 300 employees and had just invested in the well-known security tool FireEye. This tool actually did send out alerts about the malware, which the security team forwarded on to the operations team….but no one did anything about them. Not only that, FireEye has a setting that can automatically remove Malware….and they turned it off. The thought was they wanted a human to make decisions about what to remove vs. automated software.
Lessons Learned
So what are the lessons we can take away from Target? Let’s review:
Lesson 1: Security can be expensive – but not nearly as expensive as a breach.
Lesson 2: Assume every device outside your organization is compromised, because eventually one will be.
Lesson 3: Regulatory compliance might be difficult, but it is often worth it.
Lesson 3: Pay attention to the security basics. Role-based access control, least-privileged access and network segmentation are not new concepts, but they are invaluable to minimize damage.
Lesson 4: Your security tools are essential; invest in them and tailor them to work for you. Automation is there to make your life easier.
We’re going on 12 years since this hack happened, and it still serves as a powerful reminder of the critical importance of cybersecurity in today’s digital age. The Target breach underscored how even a single weak link in a company’s supply chain can have catastrophic consequences, impacting not only the business but also millions of customers. It also paved the way for stricter industry regulations and greater emphasis on safeguarding sensitive data. As cyber threats continue to evolve, the lessons from this breach remain especially relevant.
Try Portnox Cloud for Free Today
Gain access to all of Portnox's powerful zero trust access control free capabilities for 30 days!