{"id":102839,"date":"2025-02-10T16:59:44","date_gmt":"2025-02-10T08:59:44","guid":{"rendered":"https:\/\/version-2.com\/?p=102839"},"modified":"2025-01-30T17:01:55","modified_gmt":"2025-01-30T09:01:55","slug":"throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\/","title":{"rendered":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"102839\" class=\"elementor elementor-102839\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\" width=\"1201\" height=\"801\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p>The December 2013 Target hack remains one of the most infamous data breaches in cybersecurity history.<span class=\"Apple-converted-space\">\u00a0 <\/span>The hackers stole 40 million credit card numbers, got the PII (Personal Identifiable Information) of 70 million people, cost Target upwards of $200 million, and ruined Christmas for probably every single person working in Target\u2019s IT department.<span class=\"Apple-converted-space\">\u00a0 <\/span>The breach not only tarnished Target\u2019s reputation but also impacted several other sectors, highlighting the ripple effects of large-scale cyberattacks. Financial institutions faced increased costs for reissuing millions of compromised cards, while consumers dealt with heightened anxiety over identity theft and fraud. The breach also served as a wake-up call for retailers and businesses worldwide, prompting many to reevaluate their cybersecurity practices and adopt more robust systems to safeguard sensitive data. Ultimately, it underscored the critical importance of proactive cybersecurity measures in an increasingly interconnected world.<\/p><h3>What the Hack Happened<\/h3><p>The breach began when attackers targeted a third-party vendor that had legitimate access to Target\u2019s network. The vendor, Fazio Mechanical Services, was a Pennsylvania-based HVAC (heating, ventilation, and air conditioning) company that provided maintenance services to Target.<\/p><p>Attackers sent a phishing email to Fazio employees, and one unfortunate soul fell for it. That\u2019s a point that deserves some emphasis \u2013 it only takes one person, one click, in one unguarded moment, to give the bad actors a way in. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>The laptop was protected with the <a href=\"https:\/\/krebsonsecurity.com\/2014\/02\/email-attack-on-vendor-set-up-breach-at-target\/\">free version of Malwarebytes<\/a> \u2013 an excellent tool that scans for and eliminates malware when <i>initiated by the user<\/i>.<span class=\"Apple-converted-space\">\u00a0 <\/span>The version you pay for \u2013 that actually gets appropriately licensed for corporate use \u2013 has a real-time scanner that probably would have caught the issue, because the malware installed, called Citadel, was pretty well-known.<\/p><h3>Network Infiltration<\/h3><p>Using the stolen credentials from Fazio Mechanical Services, the attackers got access to a Target-hosted web service dedicated to outside vendors.<span class=\"Apple-converted-space\">\u00a0 <\/span>They uploaded a file that allowed them to install a web shell to execute commands on the hosting server.<span class=\"Apple-converted-space\">\u00a0 <\/span>Some call this a vulnerability, but there are lots of legitimate reasons a web application would let you upload files \u2013 invoices, for example \u2013 and while it should ideally block executables, it\u2019s easy enough to disguise them.<span class=\"Apple-converted-space\">\u00a0 <\/span><\/p><p><span class=\"Apple-converted-space\">\u00a0<\/span>They used a <a href=\"\/en\/cybersecurity-101\/what-is-a-pass-the-hash-attack\/\">Pass-the-Hash<\/a> attack to get domain admin credentials, and then the network was their playground.<span class=\"Apple-converted-space\">\u00a0 <\/span>They went looking for database servers, and they found them \u2013 to the tune of 70 million records of PII (Personally Identifiable Information.)<\/p><p>But here\u2019s a fun fact \u2013 know what those databases did not contain?<span class=\"Apple-converted-space\">\u00a0 <\/span>Credit card numbers!<span class=\"Apple-converted-space\">\u00a0 <\/span>Because Target\u2019s data was <a href=\"\/en\/resources\/compliance\/pci-dss\/\">PCI-DSS<\/a> compliant, there was no financial info stored on their database servers. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><h3>Deployment of Malware &amp; Exfiltration of Data<\/h3><p>Having been foiled in their scheme by Target\u2019s PCI-DSS compliance, the hackers moved on to plan B (or what might have been plan A all along, we don\u2019t really know) \u2013 infiltrate the PoS (Point-of-Sale) servers and capture credit card data in real-time.<span class=\"Apple-converted-space\">\u00a0 <\/span>They did this using malware called Kaptoxa, which would scrape the machine\u2019s memory and store anything that looked like a credit card number in a file. Then, the malware would periodically transfer that file to another server, which would transfer it back to the hackers via FTP. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>If you\u2019ve been following along so far, one thing that may have stuck out to you was how the attackers were able to wander through the network, accessing pretty much whatever they pleased.<span class=\"Apple-converted-space\">\u00a0 <\/span>This is why standard security procedures \u2013 like role-based access control and network segmentation, are so important. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>Note: There\u2019s a very thorough deep-dive about the hack <a href=\"https:\/\/aroundcyber.wordpress.com\/wp-content\/uploads\/2014\/09\/aorato-target-report.pdf\">here<\/a>, including all of the tools, protocols, and technology used if you want to geek out.<\/p><h3>Target\u2019s Security Posture Before the Breach<\/h3><p>You might think that Target had pretty poor security before the breach, but that was surprisingly (and alarmingly) not true.<span class=\"Apple-converted-space\">\u00a0 <\/span>They had a s<a href=\"https:\/\/slate.com\/technology\/2022\/04\/breached-excerpt-hartzog-solove-target.html\">ecurity team of over 300 employees<\/a> and had just invested in the well-known security tool FireEye.<span class=\"Apple-converted-space\">\u00a0 <\/span>This tool actually did send out alerts about the malware, which the security team forwarded on to the operations team\u2026.but <a href=\"https:\/\/hbr.org\/2014\/03\/could-target-have-prevented-its-security-breach\">no one did anything <\/a>about them.<span class=\"Apple-converted-space\">\u00a0 <\/span>Not only that, FireEye has a setting that can automatically remove Malware\u2026.and they turned it off. The thought was they wanted a human to make decisions about what to remove vs. automated software. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><h3>Lessons Learned<\/h3><p>So what are the lessons we can take away from Target?<span class=\"Apple-converted-space\">\u00a0 <\/span>Let\u2019s review:<\/p><p><strong>Lesson 1:<\/strong> Security can be expensive \u2013 but not nearly as expensive as a breach.<\/p><p><strong>Lesson 2:<\/strong> Assume every device outside your organization is compromised, because eventually one will be.<\/p><p><strong>Lesson 3:<\/strong> Regulatory compliance might be difficult, but it is often worth it.<\/p><p><strong>Lesson 3:<\/strong> Pay attention to the security basics.<span class=\"Apple-converted-space\">\u00a0 <\/span>Role-based access control, least-privileged access and network segmentation are not new concepts, but they are invaluable to minimize damage. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><strong>Lesson 4:<\/strong> Your security tools are essential; invest in them and tailor them to work for you.<span class=\"Apple-converted-space\">\u00a0 <\/span>Automation is there to make your life easier. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p>We\u2019re going on 12 years since this hack happened, and it still serves as a powerful reminder of the critical importance of cybersecurity in today\u2019s digital age.<span class=\"Apple-converted-space\">\u00a0 <\/span>The Target breach underscored how even a single weak link in a company\u2019s supply chain can have catastrophic consequences, impacting not only the business but also millions of customers. It also paved the way for stricter industry regulations and greater emphasis on safeguarding sensitive data. As cyber threats continue to evolve, the lessons from this breach remain especially relevant. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The December 2013 Target hack remains one of the most i [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1305,61],"tags":[1077,352,423],"class_list":["post-102839","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1305","category-press-release","tag-1077","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2\" \/>\n<meta property=\"og:description\" content=\"The December 2013 Target hack remains one of the most i [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T08:59:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right?\",\"datePublished\":\"2025-02-10T08:59:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\\\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-45fb006\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\",\"keywords\":[\"2025\",\"Network\",\"Portnox\"],\"articleSection\":[\"Portnox\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/\",\"name\":\"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-45fb006\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\",\"datePublished\":\"2025-02-10T08:59:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-45fb006\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\",\"contentUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-45fb006\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/throwback-to-the-target-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/","og_locale":"en_US","og_type":"article","og_title":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2","og_description":"The December 2013 Target hack remains one of the most i [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/","og_site_name":"Version 2","article_published_time":"2025-02-10T08:59:44+00:00","og_image":[{"url":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right?","datePublished":"2025-02-10T08:59:44+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\/"},"wordCount":921,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png","keywords":["2025","Network","Portnox"],"articleSection":["Portnox","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/throwback-to-the-target-hack-how-it-happened-and-lessons-learned-we-learned-lessons-right\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/","name":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png","datePublished":"2025-02-10T08:59:44+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#primaryimage","url":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png","contentUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-45fb006\/www.portnox.com\/wp-content\/uploads\/2021\/05\/Portnox_Web_Graphics_Blog-Placeholder-Dark.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/throwback-to-the-target-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Throwback to the Target Hack: How It Happened, and Lessons Learned\u2026.We Learned Lessons, Right?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qKH","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=102839"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102839\/revisions"}],"predecessor-version":[{"id":102847,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102839\/revisions\/102847"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=102839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=102839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=102839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}