**Target's Dev Server Offline After Hackers Claim to Steal Source Code**

In a shocking revelation, Target Corporation's development server has gone dark after hackers claimed to have stolen the company's source code. The alleged breach has left experts and cybersecurity enthusiasts scrambling for answers.

According to multiple sources, an unknown threat actor created several repositories on Gitea, a self-hosted Git service similar to GitHub or GitLab, that appeared to contain portions of Target's internal code and developer documentation. The repositories were presented as a preview of a much larger dataset allegedly being offered for sale to buyers on an underground forum or private channel.

After BleepingComputer contacted Target with questions about the alleged breach, the files were taken offline, and the retailer's Git server, git.target.com, became inaccessible from the internet. The move has sparked concerns among cybersecurity experts who are warning of a potential data breach.

**Hackers Advertise Target Source Code for Sale**

The hackers claiming to have stolen Target's source code advertised it for sale on an underground forum or private channel. A sample repository was created on Gitea, containing tens of thousands of files and directories purportedly included in the full dataset. The listing was more than 57,000 lines long and advertised a total archive size of approximately 860 GB.

The Gitea repositories used to store Target's allegedly stolen source code are no longer available, leading many to speculate that a breach may have occurred. While BleepingComputer has not independently verified the full 860 GB dataset or confirmed that a breach occurred, the directory structure, repository naming, and internal system references in the SALE.MD index are consistent with a large enterprise Git environment.

**Target Employees Confirm Leaked Code After 'Accelerated' Git Lockdown**

Multiple Target employees have now confirmed the authenticity of leaked source code sample sets and shared internal announcements regarding an access change rollout. The move has sparked concerns among experts who believe that the lockdown may be an attempt to cover up a larger issue.

**Timeline of Events**

* **January 10th, 2026**: BleepingComputer received a tip about a threat actor posting screenshots in a private hacking community to support claims that they had gained access to Target's internal development environment. * **January 11th, 2026**: The same actor published several repositories on Gitea as a sample of the data they claimed was being offered for sale. Each repository contained a file named SALE.MD listing tens of thousands of files and directories purportedly included in the full dataset. * **January 13th, 2026**: Target's developer Git server at git.target.com became inaccessible from the internet. The repositories on Gitea were removed, and began returning 404 errors.

**What This Means for Target**

The alleged breach has left many wondering what this means for Target's cybersecurity posture and whether a larger issue is at play. As experts continue to investigate, one thing is clear: the incident has sparked concerns among cybersecurity enthusiasts and raised questions about the retailer's ability to protect its internal systems.

**How You Can Help**

If you are a Target employee or have any information regarding this event, please contact BleepingComputer confidentially. Your help in shedding light on this alleged breach is crucial in ensuring that justice is served and that Target takes necessary steps to protect its customers' data.