Target Employees Verify Authenticity of Leaked Source Code

In Data Breach News
January 14, 2026

Filmogaz reports:

Recent reports have emerged confirming that leaked source code from Target has been verified as authentic by multiple current and former employees. This discovery highlights serious security concerns regarding internal systems at the retail giant.

Leaked Source Code Verification by Target Employees

Employees have confirmed the authenticity of the leaked materials, which were first reported by BleepingComputer. The source code and related documentation were discovered on Gitea, a public platform for software development.

A former Target employee identified internal system names in the leaked data, such as “BigRED” and “TAP [Provisioning],” as components used for cloud and on-premise application management. Additionally, references to technology stacks, including Hadoop datasets, align with Target’s internal operations.

Details of the Security Change

Following the leak, Target implemented an “accelerated” security change. An internal message indicated that effective January 9th, 2026, employees would require a Target-managed network to access git.target.com, the company’s internal GitHub Enterprise Server. This new measure reflects a significant shift in how Target handles security for its proprietary source code.

Read more at Filmogaz.