January 14, 2026

Hackers Selling Target Source Code Following Alleged Cyberattack

Hackers claim to be selling 860GB of stolen internal source code from Target after a recent cyberattack, though the claims remain unverified.

Hackers Claim to Be Selling Target Source Code Following Alleged Cyberattack

Hackers are claiming to have stolen and are now selling a massive trove of internal source code belonging to U.S. retail giant Target, following what appears to be a recent cyberattack. The alleged dataset is said to total approximately 860GB and includes sensitive internal systems and documentation, though the authenticity of the claims has not yet been independently verified.

The claims emerged after a previously unknown threat actor posted on an underground hacking forum, advertising the sale of what they described as Target’s internal source code. The individual suggested this was only the first dataset to be offered, hinting that additional material could follow.

Massive Dataset Allegedly Exposed

To bolster their claims, the hackers created multiple repositories on Gitea, a self-hosted Git service, and uploaded a limited sample of the allegedly stolen data. The repositories—collectively referencing around 860GB of material—appeared to contain internal source code, configuration files, and developer documentation.

Repository names pointed to a range of internal Target systems, including digital wallet services, identity and authentication tools, store networking software, secrets documentation, and gift card infrastructure. Each repository included a SALE.MD file outlining tens of thousands of files and directories purportedly included in the full archive. One index reportedly exceeded 57,000 lines.

Further raising concerns, commit metadata and documentation within the repositories referenced internal Target development servers and URLs such as confluence.target.com, as well as the names of current Target lead and senior engineers.

Swift Takedown and Server Lockdown

After the repositories were discovered, cybersecurity outlet BleepingComputer notified Target of the findings. Shortly afterward, the Gitea repositories were taken offline. Around the same time, Target reportedly locked down its internal Git server, which had been accessible from the internet.

BleepingComputer also noted that search engines had previously indexed and cached some content from git.target.com, suggesting that portions of the allegedly stolen data may have been publicly accessible at some point. However, it remains unclear when this exposure may have occurred or whether it was the result of misconfiguration.

Breach Still Unconfirmed

As of now, the authenticity of the hackers’ claims has not been confirmed, and Target has not issued a public statement regarding the incident. Still, security researchers note that the company’s rapid response in removing repositories and restricting server access suggests the matter is being treated seriously.

If verified, the exposure of internal source code and documentation could pose long-term security risks, potentially aiding future attacks against Target’s systems or services. The situation remains under investigation, and further details are expected to emerge as analysis continues.

Know what’s happening to your data

Explore our blog to protect yourself from doxxing threats and safeguard your personal information.

January 14, 2026

New VoidLink Cloud-Native Malware Targets Linux Systems

Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments.

Read More

January 14, 2026

Hackers Selling Target Source Code Following Alleged Cyberattack

Hackers claim to be selling 860GB of stolen internal source code from Target after a recent cyberattack, though the claims remain unverified.

Read More

January 14, 2026

Magecart Campaign Steals Credit Card Data From E-Commerce Sites

Cybersecurity researchers uncovered a sophisticated Magecart campaign active since at least January 2022 that steals credit card data from WooCommerce sites using Stripe, affecting major global payment networks.

Read More

All EraseMe plans include a 30-day risk-free refund guarantee.

Not satisfied? Reach out to our 24/7 Support within 30 days of joining, and we’ll refund every cent—no questions asked.

Try EraseMe