Form: Cost-of-Breach DisclosureSource: IBM 2025Filed: 28 Apr 2026
DataBreachCost.comOpen calc
Case File 04.TGT / Target CorporationDisclosed 19 Dec 2013

Case ID

Target 2013: $292M, the breach that boardrooms remember.

The case that turned PCI DSS from a checkbox exercise into a board-level concern. Attackers compromised Target's HVAC vendor (Fazio Mechanical Services), used the vendor's portal access to enter Target's corporate network, and pivoted to install POS malware on 1,797 stores during the 2013 holiday season. Total cost across regulators, class actions, card-issuer settlements, and remediation crossed $292M. Both the CEO and CIO resigned within months.

Cards exposed

40M

Payment-card data

Customer records

70M

Name, address, email, phone

Total cost

$292M

SEC-disclosed direct cost 2013-2017

Stock impact

-10%

6-month recovery

Section TGT.1

The HVAC-vendor pivot that became a security textbook chapter

Attackers compromised Fazio Mechanical Services, a Pennsylvania-based HVAC vendor that held a network-connected portal for invoice submission and contract management with Target. The vendor had been issued network credentials to access the portal. Fazio was running an outdated free version of Malwarebytes that did not include real-time scanning, and the company had limited security architecture overall. The initial compromise of Fazio was the entry point.

From the vendor portal the attackers pivoted to the Target corporate network. Network segmentation between the vendor-facing portal and the payment-processing systems was absent or inadequate, allowing lateral movement. The attackers reached the POS systems and installed BlackPOS memory-scraping malware on the point-of-sale terminals in 1,797 stores during November and December 2013, the peak holiday shopping window. Card data was exfiltrated through compromised internal servers to drop sites outside the Target environment.

The detection failure compounded the design failure. Bloomberg Businessweek reported in March 2014 that Target's FireEye intrusion-detection system had generated alerts about the BlackPOS malware multiple times in late November 2013, and that Target's SOC had reviewed and declined to act on the alerts. The case became a teaching example for security operations on alert-fatigue management and escalation procedures.

Section TGT.2

The $292M cost composition

Cost line itemAmountSource
Card-issuer settlement (Visa)$67MVisa class-action settlement, August 2015
Card-issuer settlement (Mastercard)$39MMastercard Alternative Recovery Offers, 2015
Consumer class-action settlement$10MDistrict of Minnesota class certification 2015
Bank class-action settlement$39.4MDistrict of Minnesota bank class settlement 2015
Multistate AG settlement (47 states + DC)$18.5MMultistate AG announcement 23 May 2017
Direct response and remediation (operating)~$200MTarget SEC 10-K filings 2013-2017
Insurance recovery (offset)-($90M)Target SEC 10-K disclosures 2013-2014
Net total cumulative cost$292MTarget SEC 10-K filings 2013-2017

The $292M figure represents net cumulative cost after insurance recovery. Gross cost before insurance was approximately $382M. The insurance recovery of approximately $90M was substantially below the gross cost, establishing one of the early precedents that cyber-insurance coverage is materially below total breach exposure for large retailers.

Section TGT.3

Executive departures and board-level shock

Target CIO Beth Jacob resigned in March 2014. Target CEO Gregg Steinhafel resigned in May 2014, the first CEO departure attributable directly to a data breach in the modern era. The Steinhafel resignation was the moment the breach moved from operational concern to board-level governance crisis at every other large US retailer. Within 12 months, every Fortune 100 retailer had restructured CISO reporting to provide direct board access at least quarterly, with most adopting standing audit-committee oversight of cybersecurity risk.

The wider executive-protection consequence flowed through D&O insurance markets. By 2015 cybersecurity-specific exclusions in D&O policies had largely been removed because issuers were finding that the exclusions made the policies unsaleable. Target's case also accelerated the move toward separate cyber-D&O policies that explicitly cover CISO personal liability, a market that was nascent in 2013 and standard by 2018.

Target's board faced a separate shareholder derivative lawsuit alleging breach of fiduciary duty. The case was dismissed in 2016, with the court finding that the board had received sufficient cybersecurity briefings and that the Caremark standard for board oversight was met. The dismissal helped clarify the standard for board-level cyber oversight in derivative litigation, though subsequent cases (notably the Marchand v. Barnhill decision in Delaware) have raised the bar materially since 2019.

Section TGT.4

The PCI DSS aftermath

Target had been PCI DSS Level 1 compliant at the time of the breach, with a current Report on Compliance signed by its QSA. The compliance was technically accurate against the standard but did not prevent the incident. The case prompted PCI Security Standards Council to publish PCI DSS 3.0 in November 2013 (coincidentally finalised within weeks of the Target detection) with enhanced requirements around vendor management and security awareness. PCI DSS 3.2 in 2016 added multi-factor authentication requirements for non-console administrative access, a direct response to the Fazio credential pivot.

The card brands tightened the consequence side as well. Visa and Mastercard restructured their compromised-account assessment programmes to reduce the friction between detection and assessment of penalties. The Account Data Compromise Event regime that produced the $67M Visa settlement was refined in subsequent years to provide clearer schedules to acquiring banks and merchants. The structural shift was toward higher penalties applied faster, which has held into the 2020s.

Section TGT.5

The chip-card acceleration

The Target breach accelerated US adoption of EMV chip cards by approximately 18 months. The EMV liability shift, scheduled by Visa and Mastercard for October 2015 in the US, became a board-level mandate for retailers and issuers after Target. Retailers that had been considering deferring the chip-reader infrastructure investment to extract another year of useful life from existing magstripe-only terminals reversed course in early 2014. The end result was EMV adoption at US point-of-sale terminals reaching approximately 75% by end-2017, against pre-Target projections of approximately 50% at the same date.

The card-present fraud reduction from EMV adoption has been substantial. By 2020, card-present counterfeit fraud at US retailers had fallen approximately 87% from the 2014 peak per Visa data, validating the EMV investment thesis. The Target breach was the single largest catalyst for that investment cycle.

Cross-references

Schedule F / Reference Q&A

Frequently Asked Questions

Primary source:Target 2013 breach data from Target SEC 10-K filings 2013-2017, multistate AG announcement 23 May 2017, In re Target Corporation Customer Data Security Breach Litigation, Senate Commerce Committee report March 2014, and Bloomberg Businessweek coverage 13 March 2014.