Home Depot attackers broke in using a vendor's stolen credentials

As many as 53M email addresses were stolen

home depot
Credit: Thinkstock

Home Depot has shed more light on a recent data breach that compromised 56 million payment cards, saying hackers used login credentials belonging to another company to access its network. It also revealed that 53 million email addresses were also stolen.

The stolen login credentials didn't provide direct access to its point-of-sale terminals, Home Depot said. But once inside, the hackers gained "elevated rights" that allowed them to navigate to other parts of its network and install their malware on self-checkout systems in the U.S. and Canada.

The retailer didn't identify the third-party vendor that was compromised. A Home Depot spokesman said the attack is still under investigation and the company could not comment further.

The attack method mirrors the one used against Target, whose point-of-sale systems were compromised after attackers used login credentials belonging to a heating and ventilation contractor from Pennsylvania, Fazio Mechanical Services.

Faizo maintained a network connection to Target in order to exchange contract and project management data.

Home Depot also disclosed Thursday that files containing 53 million email addresses were also stolen in the credit card breach. The files did not also contain passwords, Home Depot said. The company is notifying the affected customers in the U.S. and Canada.

The retail industry has been shaken by a series of attacks against the point-of-sale devices that process card payments, including at Target, Neiman Marcus, White Lodging, Michaels and The UPS Store.

The malware used is known as a memory scraper, because it scrapes the data left in the RAM of the point-of-sale terminal after the card has been swiped.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

The brave new world of Windows 10 license activation
View Comments
Join the discussion
Be the first to comment on this article. Our Commenting Policies