Home Depot: Someone's WEAK-ASS password SECURITY led to breach

It wasn't me, says mega-retailer


Hackers gained access to Home Depot's network via a third-party vendor system, according to preliminary results of an investigation into the September mega-breach.

Cybercrooks used access to the US retail giants' network gained via ineffective password security at an unnamed third party vendor's system to run a stepping-stone attack that ultimately allowed them to achieve their objective of planting information-stealing malware on sales terminals, according to a statement by Home Depot on the investigation.

Criminals used a third-party vendor's user name and password to enter the perimeter of Home Depot's network. These stolen credentials alone did not provide direct access to the company's point-of-sale devices. The hackers then acquired elevated rights that allowed them to navigate portions of Home Depot's network and to deploy unique, custom-built malware on its self-checkout systems in the US and Canada.

Following the discovery of the breach, Home Depot acted quickly to block the hackers' method of entry and purge their malware from its systems but by then the damage had already been done.

Third parties were also to blame one way or another for third parties for other high-profile breaches against retailer Target and bank JPMorgan. Target was broken into via the firm's HVAC vendor while the JPMorgan happened via a third party website.

Chris Wysopal, CTO of application security company Veracode, commented: "It is clear that the theft of third party vendor credentials is a big risk for enterprises after seeing this attack vector used in recent major breaches. Enterprises should adopt 2 factor authentication for vendors who require access to their corporate networks and applications."

As previously reported earlier today, Home Depot also admitted on Thursday that hackers has swiped 53 million email addresses during the September mega-breach earlier this year that also led to the theft of data from 56 million credit/debit cards.

Home Depot is in the process of advising affected customers. In the meantime, shoppers are advised to be on their guard against the possibility of phishing fraudsters that use the stolen information to craft more convincing scams.

Trey Ford, global security strategist at Rapid7, the developers of Metaspolit, said that the hack offered lessons that are applicable beyond the retail sector.

"So Home Depot confirmed several things the rest of us should remain aware of," Ford said. "Attackers were inside their organisation for five months before detection. The attackers entered with stolen credentials, they used a vendor’s username and password to log into Home Depot’s network.

"Let’s be clear: this is not hacking, this is routine activity that looks like normal behaviour.

"Once inside, the attackers picked up elevated rights to deploy software to point of sale systems, just like a systems administrator would — except they deployed specialized malware to do their dirty work," he concluded. ®

Similar topics

Broader topics

Narrower topics


Other stories you might like

  • DigitalOcean tries to take sting out of price hike with $4 VM
    Cloud biz says it is reacting to customer mix largely shifting from lone devs to SMEs

    DigitalOcean attempted to lessen the sting of higher prices this week by announcing a cut-rate instance aimed at developers and hobbyists.

    The $4-a-month droplet — what the infrastructure-as-a-service outfit calls its virtual machines — pairs a single virtual CPU with 512 MB of memory, 10 GB of SSD storage, and 500 GB a month in network bandwidth.

    The launch comes as DigitalOcean plans a sweeping price hike across much of its product portfolio, effective July 1. On the low-end, most instances will see pricing increase between $1 and $16 a month, but on the high-end, some products will see increases of as much as $120 in the case of DigitalOceans’ top-tier storage-optimized virtual machines.

    Continue reading
  • GPL legal battle: Vizio told by judge it will have to answer breach-of-contract claims
    Fine-print crucially deemed contractual agreement as well as copyright license in smartTV source-code case

    The Software Freedom Conservancy (SFC) has won a significant legal victory in its ongoing effort to force Vizio to publish the source code of its SmartCast TV software, which is said to contain GPLv2 and LGPLv2.1 copyleft-licensed components.

    SFC sued Vizio, claiming it was in breach of contract by failing to obey the terms of the GPLv2 and LGPLv2.1 licenses that require source code to be made public when certain conditions are met, and sought declaratory relief on behalf of Vizio TV owners. SFC wanted its breach-of-contract arguments to be heard by the Orange County Superior Court in California, though Vizio kicked the matter up to the district court level in central California where it hoped to avoid the contract issue and defend its corner using just federal copyright law.

    On Friday, Federal District Judge Josephine Staton sided with SFC and granted its motion to send its lawsuit back to superior court. To do so, Judge Staton had to decide whether or not the federal Copyright Act preempted the SFC's breach-of-contract allegations; in the end, she decided it didn't.

    Continue reading
  • US brings first-of-its-kind criminal charges of Bitcoin-based sanctions-busting
    Citizen allegedly moved $10m-plus in BTC into banned nation

    US prosecutors have accused an American citizen of illegally funneling more than $10 million in Bitcoin into an economically sanctioned country.

    It's said the resulting criminal charges of sanctions busting through the use of cryptocurrency are the first of their kind to be brought in the US.

    Under the United States' International Emergency Economic Powers Act (IEEA), it is illegal for a citizen or institution within the US to transfer funds, directly or indirectly, to a sanctioned country, such as Iran, Cuba, North Korea, or Russia. If there is evidence the IEEA was willfully violated, a criminal case should follow. If an individual or financial exchange was unwittingly involved in evading sanctions, they may be subject to civil action. 

    Continue reading

Biting the hand that feeds IT © 1998–2022