Cyber Case Study: Target Data Breach - CoverLink Insurance - Ohio Insurance Agency (2024)

During the final months of 2013, Target—the well-known American retailer—experienced a large-scale security breach. The Target data breach breach led to several point-of-sale systems being compromised by malware, giving cybercriminals access to millions of customers’ personal and financial data. The incident became one of the most high-profile data breaches of the decade, impacting customers across the country.

Target faced numerous consequences in the aftermath of the breach—including a range of recovery expenses, hundreds of lawsuits, decreased customer confidence, lost profits and widespread criticism related to the company’s initial response. In hindsight, organizations can learn many lessons by analyzing the details of this breach, its impact and Target’s mistakes along the way. Here’s what your organization needs to know.

The Details of the Target Data Breach

Cyber Case Study: Target Data Breach - CoverLink Insurance - Ohio Insurance Agency (1)In September 2013, cybercriminals utilized an email-based phishing scam to trick an employee from Fazio Mechanical—an HVAC contractor and one of Target’s third-party vendors—into providing their credentials. From there, the cybercriminals used these stolen credentials to infiltrate Target’s network and install malware on a number of point-of-sale systems on November 15th. Even though Target had various cybersecurity measures in place to help avoid such an incident, Fazio Mechanical’s lack of malware detection software and both companies’ failure to properly segment their networks permitted the cyber-criminals to execute their plan successfully.

The cybercriminals officially launched the malware and began collecting customer data from Target’s point-of-sale systems on November 27th. Three days later, FireEye—a company that Target had purchased security software from earlier that year—detected the malware and reported the issue to Target’s headquarters. Despite receiving this report, Target did not take steps to stop the malware. After Target’s inadequate response, the cybercriminals were then able to implement exfiltration malware on the point-of-sale systems to transport customer data out of the company’s network. In the coming days, the cybercriminals began moving the data. This activity triggered another report from FireEye on December 2nd. However, Target still did not respond to the malware.

On December 12th, the U.S. Department of Justice identified the malware and notified Target of the breach. At that point, Target began to investigate the incident, receiving assistance from both the Secret Service and the FBI. By December 15th, most of the malware had been removed. On December 18th, a cybersecurity blogger became aware of the breach and publicly shared the incident’s details. One day later, Target released an official statement on the matter, outlining what happened and confirming that the company was working with the proper authorities to resolve the incident. Nevertheless, severe damage had already been done. In total, the cyber criminals compromised approximately 40 million customers’ credit and debit card information as well as 70 million customers’ personal details (e.g., names, addresses and phone numbers).

The Impact of the Target Data Breach

In addition to compromised customer data, Target encountered a series of ramifications after the breach.

Recovery costs
Target had to take several steps to recover from the breach and minimize the risk of future security incidents. Recovery efforts included obtaining assistance from a third-party forensics firm to investigate the breach, offering customers one year of free credit monitoring, setting up a call center for breach-related concerns, equipping point-of-sale systems with chip-and PIN-enabled technology, segmenting different company networks and implementing stricter access controls. The overall cost of these efforts totaled more than $250 million.

Legal expenses
Apart from recovery costs, Target also faced significant legal expenses from the breach. In particular, the company was involved in over 140 lawsuits throughout the country regarding the incident. In 2017—four years after the breach occurred—Target finally reached an $18.5 million settlement spanning 47 states. As part of the settlement, the company was required to consult a third party to help encrypt and further protect customer data, as well as hire an executive responsible for leading a workplace cybersecurity program—thus compounding costs.

Reputational damages
Lastly, Target experienced a range of reputational issues due to the breach—namely, reduced customer confidence and distrust in senior leadership. The timing of the incident was especially detrimental, seeing as it took place during the holiday shopping season and negatively impacted year-end sales.

In fact, Target’s profits dropped by a staggering 46% during the final quarter of 2013. Moving into January 2014, one-third (33%) of U.S. households reported shopping at Target—down 10% from the previous year. The company’s prolonged response to the breach was also heavily criticized, causing stakeholders to hold senior leaders accountable for the delay and demand change. As a result, both Target’s longstanding CEO and chief information officer stepped down in 2014, paving the way for significant transitions in executive leadership.

Lessons Learned from the Target Data Breach

There are several cybersecurity takeaways from the Target data breach. Specifically, the incident emphasized these important lessons:

Investing in cybersecurity measures is worth it.
This large-scale breach could have been minimized or potentially avoided altogether if Target had additional cybersecurity precautions in place, such as network segmentation and more elaborate data encryption techniques. As such, this incident highlighted the value of investing in adequate cybersecurity procedures. The expense of implementing these measures is well worth the benefit of deterring even costlier incidents further down the road.

An effective cyber incident response plan is critical.
One of Target’s greatest downfalls during the breach was the company’s initial response. Although Target received multiple reports from FireEye about the malware, the company failed to act until the federal government got involved. By responding just days earlier, Target could have stopped the cybercriminals before they could transport customer data—significantly limiting the impact of the breach. What’s more, the company also took extra time to inform the public of the incident, which upset many customers. Such concerns emphasize how critical it is to take reports seriously, act quickly and have an effective cyber incident response plan in place. This type of plan can help an organization establish timely response protocols for remaining operational and mitigating losses in a cyber incident. Generally speaking, an effective cyber incident response plan should outline:

• Who is part of the cyber incident response team (e.g., board members, department leaders, IT professionals, legal experts and HR specialists)
• What roles and responsibilities each member of the cyber incident response team must uphold during an attack
• What the organization’s key functions are and how these operations will continue throughout an attack
• How any critical workplace decisions will be made during an attack
• When and how stakeholders should be informed of an attack (e.g., employees, customers, shareholders and suppliers)
• What federal, state and local regulations the organization must follow when responding to an attack (e.g., incident reporting protocols)
• When and how the organization should seek assistance from additional parties to help recover from an attack (e.g., law enforcement and insurance professionals)

Third-party exposures must be considered.
This breach also showcased the importance of promoting third-party security. After all, Fazio Mechanical’s cyber vulnerabilities are what ultimately led to the onset of the breach. To prevent these exposures, it’s vital to work with vendors, suppliers and other third parties to ensure they uphold effective cyber-security practices. This collaboration may include incorporating cyber risk management within vendor contracts, restricting third parties’ access to sensitive data and monitoring suppliers’ compliance with applicable regulations—such as the Payment Card Industry Data Security Standard.

Proper coverage can make all the difference.
Finally, this breach made it evident that no organization—not even a successful, national retailer like Target—is immune to a data breach. What’s worse, cyber incidents have only increased in cost and frequency since this event occurred. That’s why it’s crucial to ensure adequate protection against cyber-related losses by securing proper coverage. Make sure your organization works with a trusted insurance professional when navigating these coverage decisions.

We can help.

In the unfortunate event that your business falls victim to a cyber attack, of any type, we can help you recover.

Cyber & Data Breach Liability coverages are developing on a daily basis as new threats emerge and new insurance companies enter the market.

Regardless of the type of business, one thing is certain, if you’re a business in operation today, you face cyber risks. Which means, you need to thoroughly understand your risk of a loss, how you would respond if a loss did occur, and whether coverage makes sense for you.

The level of coverage your business needs is based on your individual operations and can vary depending on your range of exposure. It’s important to work with an Insurance Advisor that can identify your areas of risk, and customize a policy to fit your unique situation.

If you’d like additional information and resources, we’re here to help you analyze your needs and make the right coverage decisions to protect your operations from unnecessary risk. You can download a free copy of oureBook, or if you’re ready make Cyber Liability Insurance a part of your insurance portfolio,Request a Proposalor download and get started on ourand we’ll get to work for you.

Cyber Case Study: Target Data Breach - CoverLink Insurance - Ohio Insurance Agency (2024)
Top Articles
The 4% Rule: The Easy Answer to “How Much Do I Need for Retirement?”
How to Use Open Interest for Intraday Trading? | Kotak Securities
Public Opinion Obituaries Chambersburg Pa
Chatiw.ib
Goodbye Horses: The Many Lives of Q Lazzarus
Goteach11
Tanger Outlets Sevierville Directory Map
Back to basics: Understanding the carburetor and fixing it yourself - Hagerty Media
R Tiktoksweets
Lonadine
House Party 2023 Showtimes Near Marcus North Shore Cinema
Viha Email Login
Apne Tv Co Com
Craiglist Tulsa Ok
Aldi Süd Prospekt ᐅ Aktuelle Angebote online blättern
Average Salary in Philippines in 2024 - Timeular
Nesz_R Tanjiro
Unity - Manual: Scene view navigation
Exterior insulation details for a laminated timber gothic arch cabin - GreenBuildingAdvisor
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
north jersey garage & moving sales - craigslist
Contracts for May 28, 2020
Yog-Sothoth
Gran Turismo Showtimes Near Marcus Renaissance Cinema
How Long After Dayquil Can I Take Benadryl
25 Best Things to Do in Palermo, Sicily (Italy)
Turbo Tenant Renter Login
Kabob-House-Spokane Photos
Keyn Car Shows
Smartfind Express Login Broward
Vht Shortener
Gunsmoke Tv Series Wiki
Delta Math Login With Google
Shauna's Art Studio Laurel Mississippi
Club Keno Drawings
Dentist That Accept Horizon Nj Health
Memberweb Bw
Chattanooga Booking Report
Dallas City Council Agenda
Whitehall Preparatory And Fitness Academy Calendar
Jewish Federation Of Greater Rochester
Boone County Sheriff 700 Report
Fifty Shades Of Gray 123Movies
Improving curriculum alignment and achieving learning goals by making the curriculum visible | Semantic Scholar
Sand Castle Parents Guide
Wgu Admissions Login
Turok: Dinosaur Hunter
Guy Ritchie's The Covenant Showtimes Near Look Cinemas Redlands
Makes A Successful Catch Maybe Crossword Clue
Great Clips Virginia Center Commons
Autozone Battery Hold Down
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 6116

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.