Target staff verify leaked internal code; access to private git server tightened

TL;DR Summary
Multiple Target current and former employees confirm that the leaked internal source code and documentation match real Target systems, with references to real platforms and codenames; the company has accelerated a security change that restricts access to the on‑prem git.target.com Git server to corporate networks or VPN, making it unavailable from the public internet; investigators note a suspected connection to a previously infected workstation and the threat actor’s claim of an 860GB dataset, though Target has not disclosed whether a breach or insider involvement is under investigation.
- Target employees confirm leaked source code is authentic BleepingComputer
- Target’s Source Code Confirmed Stolen: Why Does This Matter? Security Magazine
- Hackers claim to have Target source code for sale following recent cyberattack TechRadar
- Gitea Leak Exposes Authentic Target Internal Source Code Open Source For You
- Hackers claim to sell Target source code after alleged data leak SC Media
Reading Insights
Total Reads
0
Unique Readers
10
Time Saved
5 min
vs 6 min read
Condensed
92%
1,043 → 87 words
Want the full story? Read the original article
Read on BleepingComputer