Form: Cost-of-Breach DisclosureSource: IBM 2025Filed: 28 Apr 2026
DataBreachCost.comOpen calc
Sector File 03.RT / RetailPCI DSS / state laws / GDPR

Sector profile

Retail breaches cost $2.96M on average. Per record, $142.

IBM's 2025 retail figure of $2.96M sits at rank #9 of 10 tracked sectors, with per-record cost of $142 below the global average. Card data has a shorter useful life than PHI and replacement is cheap. PCI DSS provides a clearer compliance framework than HIPAA. Customer churn is moderate because retail loyalty is price-driven, not relationship-driven. The economics of retail breach are unique in that volume is high but per-unit cost is low.

Avg total cost

$2.96M

IBM CODB 2025

Per record

$142

Below global average

YoY change

-3%

Slight decline

PCI scope

Level 1-4

Tiered by transaction volume

Section RT.1

Why card-data breach cost is lower per record

The simple answer is that card data has a finite useful life to the attacker. A stolen credit card number ages out within days or weeks of detection as issuers cancel and reissue. Cardholders are statutorily protected from fraud liability beyond $50 under the Fair Credit Billing Act. The attacker has a narrow window of monetization, the issuer absorbs the fraud cost, and the cardholder experiences inconvenience rather than direct loss. None of that is true for stolen PHI, SSN, or genome data, which retain value indefinitely because they cannot be revoked.

For the retailer, the cost components that dominate are PCI DSS card-brand assessments (which run $5,000 to $100,000 per month per merchant ID for compliance failures), card reissuance reimbursement to issuers ($5 to $15 per card multiplied by the affected count), forensic investigation by a PCI Forensic Investigator (PFI, $200K to $2M typical), and customer-relationship investment to maintain visit frequency post-breach. Class-action exposure is real but typically settles at $5 to $50 per consumer for card-data-only breaches, materially lower than the $30 to $150 typical in PHI breaches.

Where retail breach cost can climb sharply is when the breach exposes data beyond card numbers. The 2013 Target breach is the canonical example. The headline 40M stolen card records were the smaller cost component. The 70M customer records (name, address, phone, email) exposed in the same intrusion drove higher cost than the cards themselves, because that data did not age out and triggered state breach-notification obligations in 47 states.

Section RT.2

PCI DSS as cost-of-doing-business

PCI DSS (Payment Card Industry Data Security Standard) is the compliance framework that applies to any organisation that stores, processes, or transmits cardholder data. The standard is owned by the PCI Security Standards Council jointly created by Visa, Mastercard, American Express, Discover, and JCB, but enforcement flows through the card brands directly via the acquiring-bank relationship.

PCI levels are determined by annual transaction volume. Level 1 (over 6 million transactions per year, or any merchant that has suffered a breach) requires annual on-site assessment by a Qualified Security Assessor at a cost of $50K to $250K, plus quarterly external vulnerability scanning. Level 2 (1M to 6M transactions) requires annual self-assessment with QSA review. Levels 3 and 4 require annual self-assessment questionnaires only. The cost of staying compliant runs $50K to $1M annually for a mid-sized retailer, and rises sharply post-breach because the retailer is automatically promoted to Level 1.

The card-brand fines for breach are structured as compliance penalties rather than damages. Visa publishes a confidential schedule that public-record settlements indicate runs $5,000 to $50,000 per month per merchant ID for an Account Data Compromise Event, scaling with the number of compromised accounts and the merchant's historical compliance posture. Mastercard, Amex, and Discover have parallel structures. For a Tier 1 retailer with multi-month exposure, monthly fines alone can run into seven figures before per-card reissuance reimbursement is added.

Section RT.3

Notable retail breaches

Target, 2013

40M cards + 70M customer records / POS malware / HVAC vendor credentials

$292M

The case that turned PCI DSS from a checkbox exercise into a board-level concern. Attackers compromised Target's HVAC vendor (Fazio Mechanical), used the vendor's portal access to enter Target's corporate network, and pivoted to install POS malware on 1,797 stores during the 2013 holiday season. Target disclosed $292M in total cost across multiple SEC 10-K filings from 2013 to 2017, including a $39M card-issuer settlement, $18.5M multistate AG settlement, $10M class-action settlement, $39M to MasterCard, and over $200M in operational response. The CEO and CIO both resigned.

Primary source: Target SEC 10-K 2013-2017; multistate AG settlement 23 May 2017; Senate Commerce Committee report March 2014.

Home Depot, 2014

56M cards + 53M email addresses / POS malware / Vendor credentials

$198M

Home Depot self-checkout POS terminals were targeted with custom malware between April and September 2014, with attackers entering through compromised third-party vendor credentials and pivoting through inadequately segmented self-checkout systems running outdated Microsoft Embedded POSReady. Home Depot disclosed $198M in cumulative breach cost across SEC filings, including a $19.5M consumer settlement and $25M multistate AG settlement.

Primary source: Home Depot SEC 10-K 2014-2018; multistate AG settlement 24 November 2020.

TJX Companies, 2007

94M records / WEP encryption broken / Wireless network entry

$256M

The breach that prompted PCI DSS version 1.2. TJX (parent of T.J. Maxx, Marshalls, HomeGoods) was breached through inadequately secured wireless networks at retail stores, with attackers using WEP encryption breaking to enter the network and exfiltrate 94M records over an 18-month period. TJX settled with the FTC and pledged comprehensive security improvements; the total cost across class-action, card-brand assessments, and remediation reached $256M.

Primary source: FTC consent order 27 March 2008; TJX SEC 10-K 2007-2010.

Neiman Marcus, 2024

31M records / Snowflake credential compromise / No MFA

$25M+

Part of the 2024 Snowflake credential-compromise campaign that also affected Ticketmaster, AT&T, Santander, and dozens of other organisations. Neiman Marcus disclosed the breach in mid-2024 with notification to 31M customers. The campaign demonstrated how a single credential-management failure at a cloud-data-warehouse customer can produce notification-scale costs in the tens of millions even without any breach of the cloud provider itself.

Primary source: Neiman Marcus breach notification filing California AG, 2024.

Cross-references

Schedule F / Reference Q&A

Frequently Asked Questions

Primary source:Retail sector cost figures from IBM Cost of a Data Breach Report 2025. PCI DSS economics from PCI Security Standards Council documentation and public-record breach settlements. Notable breach data from SEC 10-K filings, multistate AG settlements, and FTC consent orders.