Payment System Access Authority Failure Through Vendor Credential Lateral Movement at Target
Context
Target Corporation maintained network credentials for vendors requiring electronic access to its systems for business purposes. Fazio Mechanical Services, a refrigeration and HVAC contractor based in Sharpsburg, Pennsylvania, held credentials providing access to Target's vendor portal for electronic billing, contract submission, and project management. The vendor portal was the intended boundary of Fazio's access — the business relationship required billing connectivity, not access to Target's point-of-sale infrastructure or cardholder data environment.
Target's network architecture connected the vendor portal environment to broader internal network segments without enforcing segmentation that would prevent traffic from the vendor zone from reaching the cardholder data environment. PCI DSS — the Payment Card Industry Data Security Standard — requires segmentation isolating the cardholder data environment from other network segments. Target maintained PCI DSS compliance certification, but the network pathway between the vendor portal and the payment card environment existed as a traversable route that segmentation controls did not block.
Trigger
Attackers compromised Fazio Mechanical Services through a phishing email, obtaining the contractor's credentials to Target's vendor portal. Using those credentials, the attackers entered Target's network through the vendor portal and moved laterally — traversing from the vendor management zone to internal network segments, ultimately reaching Target's point-of-sale systems. They installed malware on POS terminals across Target's retail locations that captured payment card data in memory during transactions, then exfiltrated the data to external servers. Between November 27 and December 15, 2013, the malware captured approximately 40 million payment card records.
Target's security monitoring system — a FireEye intrusion detection platform installed months before the breach — generated alerts detecting the malicious activity. The alerts were not acted upon. Target was notified of the breach by the U.S. Department of Justice on December 12, 2013, after law enforcement identified the compromise through financial industry fraud pattern analysis. Target's own monitoring system detected the breach but the organization did not respond to its own alerts.
Failure Condition
The access control system correctly authenticated the vendor credential and granted access to the vendor portal — the intended scope of the business relationship. The failure was that authentication to the vendor portal provided a network position from which the cardholder data environment was reachable. The access control answered the authentication question — is this a valid vendor credential? — without enforcing the segmentation question — can traffic from this entry point reach systems outside the vendor's business function? The credential was scoped to a business purpose. The network was not scoped to match.
The monitoring failure compounded the access control failure. Target's FireEye system detected the intrusion and generated alerts — the monitoring infrastructure functioned as designed. The alerts were not investigated or acted upon, replicating the pattern documented across multiple cases in which detection systems generate signals that the organizational response process does not convert into action. The access control architecture permitted the lateral movement. The monitoring system detected it. The gap between detection and response allowed the breach to continue for nineteen days.
Observed Response
Target's CEO and CIO resigned. The company reported breach-related costs exceeding $200 million, including settlements with payment card networks, financial institutions, state attorneys general, and a $18.5 million multistate settlement. Target overhauled its network segmentation, vendor access controls, and security monitoring response procedures. The breach became a reference case for PCI DSS enforcement discussions, particularly regarding the distinction between compliance certification and actual segmentation effectiveness — Target held PCI compliance certification at the time of the breach while the network pathway the attackers traversed existed.
Analytical Findings
- Attackers entered Target's network using an HVAC contractor's legitimate vendor portal credentials, then moved laterally to the cardholder data environment — a network segment unrelated to the vendor's business function
- Access controls authenticated the vendor credential without constraining the network pathways available from the vendor portal entry point
- Network segmentation did not enforce the boundary between the vendor management zone and the payment card environment despite PCI DSS compliance certification
- Target's FireEye monitoring system detected the intrusion and generated alerts that were not acted upon
- Approximately 40 million payment card records and 70 million customer contact records were compromised over nineteen days
- Detection came from external law enforcement notification, not from the organization's response to its own monitoring alerts
- Breach costs exceeded $200 million; CEO and CIO resigned; became reference case for the gap between PCI compliance certification and actual network segmentation enforcement
- 1. U.S. Senate Committee on Commerce, Science, and Transportation, "A 'Kill Chain' Analysis of the 2013 Target Data Breach," majority staff report, March 26, 2014.
- 2. Krebs, Brian, "A First Look at the Target Intrusion, Malware," KrebsOnSecurity, January 15, 2014.
- 3. Target Corporation, financial disclosures regarding data breach costs and remediation, 2014-2017.
- 4. Payment Card Industry Security Standards Council, PCI DSS requirements for network segmentation and third-party access controls.
- 5. Multistate Attorney General settlement with Target Corporation, $18.5 million, May 23, 2017.