Home Depot said on Thursday that hackers managed to grab 53 million customer email addresses during the massive breach that was disclosed in September. The new details add to the pain from when the retail giant announced that 56 million customer payment cards were compromised between April and September 2014.
“Today, we are providing an update on the investigation into the breach of our payment data systems,” the company said in a statement. “Our investigation to date has determined the hackers stole separate files containing email addresses, in addition to the payment card data we announced in September that may have been compromised.”
The files containing the stolen email addresses did not contain passwords, payment card information or other sensitive personal information, the company said.
Additional details disclosed on Thursday, some of which have already been circulating, include:
• Criminals used a third-party vendor’s user name and password to enter the perimeter of Home Depot’s network.
• The stolen credentials alone did not provide direct access to the company’s point-of-sale devices.
• The hackers acquired elevated rights that allowed them to navigate portions of Home Depot’s network and to deploy unique, custom-built malware on its self-checkout systems in the U.S. and Canada.
Home Depot previously said that it was first made aware of a potential breach of its payment processing systems on Sept. 2 after being notified by law enforcement.
The home improvement giant previously stated it will roll out EMV ‘Chip and PIN’ to all U.S. stores by the end of this year in advance of the October 2015 deadline.
As CORE Security CEO Mark Hatton noted in a recent SecurityWeek column, Bloomberg has reported that Home Depot expects to pay roughly $62 million this year to recover from the incident, including everything from call-center staffing to legal expenses. Insurance will reportedly cover up $27 million of that tab.
Home Depot operates 2,265 retail stores in the US, Canada and Mexico and had annual sales of $78.8 billion in 2013.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
