Target Data Breach PCI DSS Failures: What Cost $300 Million
The Target data breach of late 2013 remains one of the most instructive case studies in PCI DSS history. Attackers stole 40 million payment card numbers and 70 million customer records over a three-week window during the holiday shopping season. Target was PCI DSS certified at the time of the attack. The breach exposed how a compliant certification and a secure environment are not the same thing.
This article examines what happened, which PCI DSS requirements failed in practice, how a third-party HVAC vendor became the entry point, and the specific control gaps that compliance officers still miss more than a decade later.
Timeline of the Target Data Breach
November 15, 2013: Attackers gain access to Target's network through stolen credentials from Fazio Mechanical Services, a third-party HVAC contractor in Pennsylvania. The credentials were phished from a Fazio employee weeks earlier.
November 27, 2013 (Black Friday week): Malware called BlackPOS is installed on Target's point-of-sale systems. It captures card data in memory during the narrow window between card swipe and encryption.
November 30, 2013: Target's newly deployed FireEye intrusion detection system generates alerts. Target's Bangalore security operations center escalates the alerts to US security staff. No containment action is taken.
December 2, 2013: FireEye generates a second wave of alerts. No action is taken.
December 12, 2013: The US Department of Justice notifies Target that stolen card data has been discovered on underground marketplaces.
December 15, 2013: Target isolates the affected systems. Data exfiltration stops.
December 19, 2013: Target publicly announces the breach. The initial estimate is 40 million payment cards.
January 10, 2014: Target revises the scope. An additional 70 million records of customer personal information (names, addresses, phone numbers, email addresses) are confirmed stolen.
May 2017: Target settles with 47 state attorneys general for $18.5 million. Combined with earlier settlements, legal costs, and breach response, total costs exceed $300 million by 2018.
How the Attackers Got In
The Target data breach did not begin at Target. It began with a spear-phishing email sent to Fazio Mechanical Services, a refrigeration and HVAC contractor that held a contract to service Target stores. The phishing email installed the Citadel trojan on a Fazio workstation, which harvested the credentials Fazio used to access Target's vendor portal.
Target operated an external vendor portal that allowed contractors to submit invoices, manage contracts, and track work orders. The Fazio credentials gave access to that portal. What the attackers did next is the heart of the PCI DSS failure.
From the vendor portal, the attackers moved laterally into Target's internal network. They eventually reached the point-of-sale (POS) systems in stores and installed BlackPOS malware on thousands of them. The malware scraped card data from memory during the brief window when the data was unencrypted, then exfiltrated it through a compromised internal file share and out to servers in Russia.
The lateral movement from a vendor portal to the POS network is the critical failure. A properly segmented network with PCI DSS scope boundaries should have made that path impossible.
Which PCI DSS Requirements Failed

Target held a valid PCI DSS Level 1 compliance certification at the time of the breach, having passed a Report on Compliance audit in September 2013. The breach revealed that passing the audit and operating the controls every day are two different things.
Requirement 1: Install and Maintain a Firewall Configuration
The POS environment should have been segmented from the vendor portal, from the corporate network, and from the internet. Post-breach analysis showed that network segmentation between the vendor portal and the cardholder data environment was incomplete. Attackers moved from the vendor portal to systems that should not have been reachable from that portal.
Requirement 2: Do Not Use Vendor-Supplied Defaults
Investigators found evidence that some systems used default or weak credentials, making lateral movement easier once the initial foothold was established.
Requirement 8: Identify and Authenticate Access
The Fazio vendor credentials had no multi-factor authentication requirement. A username and password were sufficient to access the vendor portal. PCI DSS 3.0 (released in November 2013, days before the attack) required MFA for remote network access, but Target's implementation had not yet caught up.
Requirement 10: Track and Monitor All Access
This is where the breach becomes infuriating from a compliance standpoint. Target had installed a FireEye intrusion detection system. It did detect the BlackPOS malware. It did generate alerts on November 30 and December 2. Target's security operations center did escalate those alerts to US-based staff.
The alerts were reviewed and dismissed. The malware continued exfiltrating data for 12 more days.
Requirement 10 is not just about generating logs. It requires active review of alerts and a documented response process. Target had the logs. Target had the alerts. What Target lacked was a process that forced action on the alerts.
Requirement 11: Regularly Test Security Systems and Processes
Target's quarterly penetration tests had not identified the lateral movement path from the vendor portal to the POS network. Penetration testing scope is only as good as the scope definition, and in practice scope is often drawn around "the cardholder data environment" without considering all the paths into it.
Requirement 12: Maintain a Policy That Addresses Information Security
Specifically, Requirement 12.8 covers third-party service provider management. Fazio Mechanical had access to Target systems but was not subject to the security controls required for third-party service providers with cardholder data environment access. The argument was that Fazio did not need CDE access for their business function. In reality, their credentials were usable to reach the CDE.
| PCI DSS Requirement | Target's Compliance Status | Breach Role | |---|---|---| | 1. Network segmentation | Audited as compliant | Incomplete segmentation allowed lateral movement | | 2. No vendor defaults | Audited as compliant | Weak credentials found on internal systems | | 8. Authentication and MFA | Audited as compliant | No MFA on vendor portal | | 10. Logging and monitoring | Audited as compliant | Alerts generated but ignored | | 11. Penetration testing | Audited as compliant | Scope missed vendor-to-CDE paths | | 12.8. Third-party management | Audited as compliant | Fazio not treated as CDE-adjacent |
The Financial Cost of the Target Breach
By Target's own filings and subsequent settlements, total direct costs exceed $300 million:
| Cost Category | Amount | |---|---| | Gross breach-related expenses (through 2017) | $292 million | | Insurance recoveries | -$90 million | | Net financial impact | ~$202 million | | Multi-state settlement (2017) | $18.5 million | | Consumer class action settlement | $10 million | | Banking industry lawsuits | $39 million | | MasterCard and Visa assessments | $67 million combined | | Total reported direct cost | Over $300 million |
Indirect costs, including brand damage, lost customer trust, executive turnover (CEO Gregg Steinhafel resigned in May 2014), and remediation investment, are estimated to add another $100 million to $200 million over the decade following the breach.
The share price declined 10 percent in the days after the announcement. Same-store sales dropped sharply in Q1 2014. Retailer breach defense costs rose industry-wide as PCI councils and card brands demanded faster migration to chip-and-PIN cards in the US.
What PCI DSS Changed After Target
The Target data breach accelerated several changes in PCI DSS and related payment card security standards:
- MFA for all remote access was emphasized in PCI DSS 3.0 and strengthened in subsequent versions
- Network segmentation validation became a specific testing requirement, not just a design document
- Third-party service provider management requirements were expanded in PCI DSS 3.2 (2016) with stronger controls on vendor access and written acknowledgment of responsibility
- Chip-and-PIN rollout in the US accelerated dramatically, with liability shift moving to October 2015
- Continuous compliance monitoring expectations increased across the industry
- Point-to-point encryption (P2PE) solutions gained adoption as a way to take POS systems out of scope entirely
These changes are reflected in PCI DSS 4.0 requirements, which moved from strict prescriptive controls to outcome-based requirements with continuous validation expectations.
The Third-Party Risk Lesson

The Target data breach is the textbook example of third-party risk becoming your risk. Fazio Mechanical was not a security company. They serviced refrigeration equipment. They had credentials to a vendor portal for invoicing and work orders. That was enough.
For any organization under PCI DSS, the lesson is that scope extends to every path that can reach cardholder data. Third-party vendors are a path. Remote access tools are a path. Monitoring dashboards are a path. Each path needs to be identified, segmented, and validated.
Modern third-party risk management programs require:
- A complete vendor inventory, not just cardholder data environment vendors
- Network segmentation validated through active testing, not just design review
- MFA on every vendor-facing authentication surface
- Vendor-specific credentials with limited scope (no shared accounts)
- Alert response processes that force action on every high-severity alert
See our PCI DSS compliance checklist and cyber insurance requirements for implementation details.
The Alert Response Lesson
The most operationally painful lesson from Target is that their monitoring worked. FireEye detected the malware. Alerts were generated. Alerts were reviewed. Nothing happened.
This is not a technology failure. It is a process failure. A SOC that receives hundreds of alerts per day without a clear action protocol will dismiss alerts that look routine. Effective alert response requires:
- Explicit severity tiers with defined response timelines per tier
- Mandatory action on high-severity alerts, not "review and dismiss"
- Escalation paths that reach decision-makers within defined SLAs
- Post-alert review to validate whether the response was appropriate
Target had the alerts. Target did not have the process that forced action on them. Requirement 10 of PCI DSS now explicitly covers this.
How to Prevent a Target-Style Breach
Organizations working under PCI DSS today should evaluate their environment against these questions:
- Is your network segmentation validated by active testing? Not by design documents. By penetration tests that specifically try to move from every vendor-accessible surface to the cardholder data environment.
- Do every third-party vendor's credentials require MFA? Not just your own staff credentials. Every vendor login must be MFA-protected.
- Do you have vendor-specific credentials with minimum-necessary access? Shared vendor accounts and over-privileged access are lateral movement enablers.
- Does every high-severity alert trigger mandatory action? Write the action protocol. Test it. Audit adherence.
- Are your penetration tests scoped to include vendor-to-CDE paths? If the scope statement says "cardholder data environment" only, widen it.
- Do you run continuous compliance monitoring between annual audits? Point-in-time compliance is not enough.
Addressing these six questions closes the specific gaps that enabled the Target data breach. See the PCI DSS compliance guide for a broader implementation framework.
Frequently Asked Questions

Was Target PCI DSS compliant when the breach happened?
Yes, formally. Target held a valid Level 1 PCI DSS certification from a September 2013 audit. The breach began in November 2013. The compliance certification did not prevent the breach because certification is a point-in-time test, not continuous operational assurance.
How did the attackers use HVAC credentials to steal card data?
The HVAC vendor (Fazio Mechanical) had credentials to Target's vendor portal. Once in the vendor portal, the attackers exploited insufficient network segmentation to reach internal systems, eventually landing on the point-of-sale environment. The HVAC credentials did not directly give access to card data, but they gave access to a network path that eventually reached card data.
How many people were affected by the Target breach?
40 million payment card records were stolen. An additional 70 million records of customer personal information (names, addresses, phone numbers, email addresses) were also stolen, bringing the affected population to approximately 110 million unique individuals.
Why did the FireEye alerts get ignored?
Target's security operations had received a large number of alerts from the newly deployed FireEye system, and the investigation team evaluated the November 30 alerts as routine rather than actionable. Post-breach analysis confirmed that the alerts were specific enough to identify the BlackPOS malware, but the alert response process did not force containment action.
What fines did Target pay for the breach?
Target paid $18.5 million to settle with 47 state attorneys general in 2017. Total breach-related costs exceed $300 million, including banking industry settlements, MasterCard and Visa assessments, consumer class actions, and remediation expenses.
Did Target lose its PCI DSS certification?
Target's PCI DSS status was not publicly revoked, but the breach triggered a re-audit and a significant reinvestment in compliance and security operations. Target has continued to maintain Level 1 PCI DSS compliance post-breach.
How can small businesses avoid the third-party risk that caused the Target breach?
Maintain a vendor inventory, require MFA on every vendor login, limit vendor credentials to the minimum necessary access, run penetration tests that specifically look for vendor-to-sensitive-data paths, and mandate action on every high-severity alert regardless of whether it looks routine.
What is the biggest compliance lesson from the Target breach?
Compliance is a floor, not a ceiling. A PCI DSS audit tests a sample of controls at a point in time. Operational drift between audits is where breaches happen. Continuous monitoring, active penetration testing, and disciplined alert response fill the gaps that annual audits cannot.
About the Author
James Mitchell is a Compliance and Security Analyst with 8+ years of experience leading PCI DSS and SOC 2 programs for retail, SaaS, and financial services clients. He has conducted post-breach reviews for organizations across sectors and writes case study analyses to help compliance teams learn from past failures rather than repeat them. He writes for Security Compliance Guide to turn breach autopsies into practical, implementable control improvements.
Related reading:
- PCI DSS 4.0 Requirements: What Changed
- PCI DSS Compliance Guide
- Equifax Data Breach: Compliance Failures and Lessons Learned
- SolarWinds Hack: What Went Wrong
External reference: Senate Committee on Commerce, Science, and Transportation report, "A 'Kill Chain' Analysis of the 2013 Target Data Breach" available at commerce.senate.gov.
