Case ID
Target 2013: $292M, the breach that boardrooms remember.
The case that turned PCI DSS from a checkbox exercise into a board-level concern. Attackers compromised Target's HVAC vendor (Fazio Mechanical Services), used the vendor's portal access to enter Target's corporate network, and pivoted to install POS malware on 1,797 stores during the 2013 holiday season. Total cost across regulators, class actions, card-issuer settlements, and remediation crossed $292M. Both the CEO and CIO resigned within months.
Cards exposed
40M
Payment-card data
Customer records
70M
Name, address, email, phone
Total cost
$292M
SEC-disclosed direct cost 2013-2017
Stock impact
-10%
6-month recovery
Section TGT.1
The HVAC-vendor pivot that became a security textbook chapter
Attackers compromised Fazio Mechanical Services, a Pennsylvania-based HVAC vendor that held a network-connected portal for invoice submission and contract management with Target. The vendor had been issued network credentials to access the portal. Fazio was running an outdated free version of Malwarebytes that did not include real-time scanning, and the company had limited security architecture overall. The initial compromise of Fazio was the entry point.
From the vendor portal the attackers pivoted to the Target corporate network. Network segmentation between the vendor-facing portal and the payment-processing systems was absent or inadequate, allowing lateral movement. The attackers reached the POS systems and installed BlackPOS memory-scraping malware on the point-of-sale terminals in 1,797 stores during November and December 2013, the peak holiday shopping window. Card data was exfiltrated through compromised internal servers to drop sites outside the Target environment.
The detection failure compounded the design failure. Bloomberg Businessweek reported in March 2014 that Target's FireEye intrusion-detection system had generated alerts about the BlackPOS malware multiple times in late November 2013, and that Target's SOC had reviewed and declined to act on the alerts. The case became a teaching example for security operations on alert-fatigue management and escalation procedures.
Section TGT.2
The $292M cost composition
| Cost line item | Amount | Source |
|---|---|---|
| Card-issuer settlement (Visa) | $67M | Visa class-action settlement, August 2015 |
| Card-issuer settlement (Mastercard) | $39M | Mastercard Alternative Recovery Offers, 2015 |
| Consumer class-action settlement | $10M | District of Minnesota class certification 2015 |
| Bank class-action settlement | $39.4M | District of Minnesota bank class settlement 2015 |
| Multistate AG settlement (47 states + DC) | $18.5M | Multistate AG announcement 23 May 2017 |
| Direct response and remediation (operating) | ~$200M | Target SEC 10-K filings 2013-2017 |
| Insurance recovery (offset) | -($90M) | Target SEC 10-K disclosures 2013-2014 |
| Net total cumulative cost | $292M | Target SEC 10-K filings 2013-2017 |
The $292M figure represents net cumulative cost after insurance recovery. Gross cost before insurance was approximately $382M. The insurance recovery of approximately $90M was substantially below the gross cost, establishing one of the early precedents that cyber-insurance coverage is materially below total breach exposure for large retailers.
Section TGT.3
Executive departures and board-level shock
Target CIO Beth Jacob resigned in March 2014. Target CEO Gregg Steinhafel resigned in May 2014, the first CEO departure attributable directly to a data breach in the modern era. The Steinhafel resignation was the moment the breach moved from operational concern to board-level governance crisis at every other large US retailer. Within 12 months, every Fortune 100 retailer had restructured CISO reporting to provide direct board access at least quarterly, with most adopting standing audit-committee oversight of cybersecurity risk.
The wider executive-protection consequence flowed through D&O insurance markets. By 2015 cybersecurity-specific exclusions in D&O policies had largely been removed because issuers were finding that the exclusions made the policies unsaleable. Target's case also accelerated the move toward separate cyber-D&O policies that explicitly cover CISO personal liability, a market that was nascent in 2013 and standard by 2018.
Target's board faced a separate shareholder derivative lawsuit alleging breach of fiduciary duty. The case was dismissed in 2016, with the court finding that the board had received sufficient cybersecurity briefings and that the Caremark standard for board oversight was met. The dismissal helped clarify the standard for board-level cyber oversight in derivative litigation, though subsequent cases (notably the Marchand v. Barnhill decision in Delaware) have raised the bar materially since 2019.
Section TGT.4
The PCI DSS aftermath
Target had been PCI DSS Level 1 compliant at the time of the breach, with a current Report on Compliance signed by its QSA. The compliance was technically accurate against the standard but did not prevent the incident. The case prompted PCI Security Standards Council to publish PCI DSS 3.0 in November 2013 (coincidentally finalised within weeks of the Target detection) with enhanced requirements around vendor management and security awareness. PCI DSS 3.2 in 2016 added multi-factor authentication requirements for non-console administrative access, a direct response to the Fazio credential pivot.
The card brands tightened the consequence side as well. Visa and Mastercard restructured their compromised-account assessment programmes to reduce the friction between detection and assessment of penalties. The Account Data Compromise Event regime that produced the $67M Visa settlement was refined in subsequent years to provide clearer schedules to acquiring banks and merchants. The structural shift was toward higher penalties applied faster, which has held into the 2020s.
Section TGT.5
The chip-card acceleration
The Target breach accelerated US adoption of EMV chip cards by approximately 18 months. The EMV liability shift, scheduled by Visa and Mastercard for October 2015 in the US, became a board-level mandate for retailers and issuers after Target. Retailers that had been considering deferring the chip-reader infrastructure investment to extract another year of useful life from existing magstripe-only terminals reversed course in early 2014. The end result was EMV adoption at US point-of-sale terminals reaching approximately 75% by end-2017, against pre-Target projections of approximately 50% at the same date.
The card-present fraud reduction from EMV adoption has been substantial. By 2020, card-present counterfeit fraud at US retailers had fallen approximately 87% from the 2014 peak per Visa data, validating the EMV investment thesis. The Target breach was the single largest catalyst for that investment cycle.
Cross-references
Industry / Retail
→Sector context: $2.96M average, PCI DSS economics.
Regulation / PCI DSS
→Card-brand fines, reissuance economics, PFI mandates.
Cost / Forensics
→PCI Forensic Investigator engagement scope and cost.
Cost / Notification
→State-by-state notification cost for 47-state breach.
Index / All breach cases
→22 verified mega-breach case studies.
Schedule F / Reference Q&A
Frequently Asked Questions
Primary source:Target 2013 breach data from Target SEC 10-K filings 2013-2017, multistate AG announcement 23 May 2017, In re Target Corporation Customer Data Security Breach Litigation, Senate Commerce Committee report March 2014, and Bloomberg Businessweek coverage 13 March 2014.