Home Depot confirms there was indeed a breach. Presence of BlackPOS hints that the perpetrators could be the same ones who breached Target.

Sara Peters, Senior Editor

September 8, 2014

2 Min Read

UPDATED 5:15 p.m. ET: Home Depot has confirmed that it did experience a data breach that affects customers who made credit card purchases at its stores in the United States and Canada; there is no evidence that customers who made purchases in Mexico or on HomeDepot.com were impacted.

The company says that there is no evidence that debit card PINs were compromised. No further details about the nature of the attack or the scope of the damage have been revealed. The investigation is ongoing, with a focus on suspicious activity beginning in April 2014.

Home Depot is offering free identity protection services, including credit monitoring, to any customer who used a payment card at a Home Depot store in 2014, from April on.

"We apologize for the frustration and anxiety this causes our customers, and I want to thank them for their patience and support as we work through this issue," said Frank Blake, Home Depot chairman and CEO, in a statement. "We owe it to our customers to alert them that we now have enough evidence to confirm that a breach has indeed occurred. It's important to emphasize that no customers will be responsible for fraudulent charges to their accounts."

Home Depot reiterated its previously announced intentions to roll out EMV Chip-and-PIN technology to its stores by the end of the year, "well in advance of the October 2015 deadline established by the payments industry."

Original Text:

A new variant of the BlackPOS card-slurping point-of-sale malware was used in the still-unconfirmed data breach at Home Depot, sources close to the investigation told Brian Krebs of KrebsOnSecurity.

The presence of BlackPOS is one indicator that the culprits behind the suspected Home Depot attack might be the same people who used BlackPOS to lift 40 million payment card accounts from Target in December. Another indicator, according to Krebs, is that "cards apparently stolen from Home Depot shoppers first turned up for sale on Rescator.cc, the same underground cybercrime shop that sold millions of cards stolen in the Target attack."

Trend Micro first spotted the new BlackPOS variant, TSPY_MEMLOG.A, in the wild on Aug. 22. According to Trend Micro, "What's interesting about TSPY_MEMLOG.A is it disguises itself as an installed service of known [anti-virus] vendor software to avoid being detected and consequently, deleted in the infected PoS systems."

The new variant also uses similar tactics to offload pilfered data. As Trend Micro reports, in the Target breach, the attackers "offloaded the gathered data to a compromised server first while a different malware running on the compromised server uploaded it to the FTP. We surmise that this new BlackPOS malware uses the same exfiltration tactic."

About the Author(s)

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights