Back to all incidents

Home Depot — 56M card breach

Vendor credentials gave attackers network access nine months after the identical Target playbook was public; custom BlackPOS malware ran undetected for five months and captured 56 million cards.

Target
Home Depot — 56M card breach
Date public
8 September 2014
Sector
Retail
Attack type
Data Breach
Threat actor
Eastern European criminal crew (BlackPOS variant)
Severity
High
Region
United States / Canada

In September 2014 Home Depot confirmed that criminals had been sitting inside its payment systems for roughly five months, stealing 56 million customer card numbers. The attackers got in using login credentials stolen from a vendor — a third-party company that had legitimate access to Home Depot's network. Once inside, they moved through the network and installed custom malware on the self-checkout tills across every US and Canadian Home Depot store. The part that makes this breach particularly hard to defend is that nine months earlier, in December 2013, Target had suffered an almost identical breach through exactly the same method: vendor credentials, lateral movement, POS malware. The Target post-mortem had been public for months by the time the Home Depot attackers were active. Home Depot's own security team had reportedly flagged similar architectural weaknesses. The institutional response had been inadequate. Home Depot ultimately settled breach-related claims for over $200 million and became the case study for "lessons not learned."

What happened

On 8 September 2014 Home Depot disclosed that its US and Canadian point-of-sale systems had been compromised. Subsequent investigation established that attackers had installed custom malware on self-checkout terminals across virtually all Home Depot stores in North America, operating from approximately April through September 2014 — a dwell time of approximately five months. Over that period the malware captured payment card data from an estimated 56 million unique cards used at Home Depot registers. A separate exposure through the same intrusion yielded approximately 53 million customer email addresses.

The breach came nine months after the December 2013 Target breach — the most-publicised retail POS compromise in US history. The Target incident had been extensively documented in the public domain, including the specific attack vector: compromised vendor credentials as the entry point, followed by lateral movement to POS infrastructure. The Target post-mortem was a known quantity for every major US retailer’s security team by the time Home Depot’s attackers were active in April 2014.

Home Depot settled with consumer plaintiffs for $19.5 million, with financial institutions for $25 million, and with state attorneys-general. Pre-settlement breach-related costs reached approximately $179 million. A subsequent FTC action reached an additional settlement. Total breach-related financial impact exceeded $200 million.

How it worked

The attackers entered Home Depot’s network using credentials belonging to a third-party vendor — a company with legitimate network access to support Home Depot’s operations. The specific vendor and the method by which the credentials were obtained (likely phishing or malware on the vendor’s own systems) were not disclosed in detail by Home Depot. Once inside the network using the vendor’s credentials, the attackers moved laterally to reach Home Depot’s retail POS environment.

The malware deployed on Home Depot’s self-checkout terminals was a custom variant of BlackPOS, also known as FrameworkPOS — the same malware family used in the Target breach. BlackPOS is a memory-scraping malware that intercepts payment card track data from the terminal’s RAM during the brief window between the card being swiped and the data being encrypted for transmission. It stores the captured track data locally and periodically exfiltrates it to an attacker-controlled staging server. By targeting self-checkout terminals specifically, the attackers maximised the volume of cards captured per infected endpoint.

The lateral movement from a vendor credential to production POS infrastructure indicates a flat or minimally segmented network. A vendor account that needs access to support Home Depot’s systems should not, in a well-segmented environment, have any path to the retail POS network. POS terminals should sit on a network segment isolated from every other segment — accessible only through defined, controlled channels and not reachable via general corporate or vendor network access. The breach demonstrated that this segmentation was absent or ineffective.

Home Depot subsequently disclosed that its internal security team had raised concerns about network architecture and POS security prior to the breach, and that those concerns had not produced adequate remediation. This is the specific detail that makes the Home Depot incident the “lessons not learned” case study: the risks were known, the Target incident had publicly confirmed them, and the corrective action was insufficient.

Timeline

  • November–December 2013 — Target breach disclosed; vendor-credential entry, BlackPOS malware on POS systems publicly documented as the attack chain.
  • Early 2014 — Home Depot security team reportedly flags architectural weaknesses similar to those exploited in Target breach; remediation inadequate.
  • ~April 2014 — Attackers use stolen third-party vendor credentials to access Home Depot’s network; begin deploying BlackPOS variant to self-checkout terminals.
  • April–September 2014 — Malware active across US and Canadian stores; 56 million cards captured.
  • September 2014 — Home Depot detects the intrusion and removes the malware.
  • 8 September 2014 — Home Depot publicly discloses the breach.
  • 2015–2017 — Settlements reached with consumers ($19.5M), financial institutions ($25M), and state attorneys-general. Total breach costs exceed $200 million.
  • 2024 — FTC reaches additional settlement with Home Depot over data-security failures.

What defenders should learn

The Home Depot breach teaches a single devastating lesson: knowing about a risk and failing to remediate it is worse than not knowing, because it removes the “we didn’t understand the threat” defence and replaces it with “we understood the threat and did not act adequately.” Home Depot’s security team understood the vendor-credential risk. The Target post-mortem had been public for months. The institutional response was insufficient. When that insufficient response produced an identical breach, the accountability question was unavoidable.

Third-party vendor access is the concrete control failure. Vendors with network access are an extension of your attack surface. Every vendor account is a credential that an attacker can steal. The security question is: if that credential is stolen and used, what can the attacker reach? The answer at Home Depot was: the production POS network serving 2,000 stores. The correct answer should be: only the specific systems the vendor needs to do their specific job, isolated from everything else, with access time-limited and monitored. Privileged access management and network micro-segmentation for vendor accounts are not advanced security practices — they are basic vendor risk controls.

POS network isolation is the second lesson, and it is an architectural one. Payment card data has regulatory protections under PCI DSS specifically because it is high-value and high-consequence to steal. PCI DSS requires that cardholder data environments be isolated from other network segments. Home Depot’s environment did not achieve the isolation that would have prevented the breach. PCI compliance is a minimum bar, not a security ceiling; organisations that treat PCI certification as a security outcome rather than a compliance baseline are carrying residual risk that the standard’s scope limitations do not cover.

The five-month dwell time is the final lesson. Memory-scraping malware on 2,000 stores’ worth of POS terminals ran undetected for approximately five months. Modern endpoint detection tools and network monitoring capable of identifying POS malware communication patterns exist and were commercially available in 2014. The breach confirms that retail POS security monitoring was not at a level where an ongoing malware campaign was detectable within a reasonable window. Retailers that have deployed chip-and-PIN (EMV) terminals since 2015 have reduced the memory-scraping risk substantially — EMV card data is not useful after capture in the way that magnetic-stripe track data is. But the monitoring gap illustrated by Home Depot’s five-month dwell is relevant beyond POS to any environment where attacker persistence inside the perimeter goes unnoticed.

Sources

Back to all incidents