Darktrace, a global leader in AI for cybersecurity, today revealed a surge in retail cyber attacks at the opening of the 2024 holiday shopping season.
Analysis from Darktrace’s threat intelligence team using data from across the Darktrace customer fleet shows that during Black Friday week (25th to 29th November 2024) attempted Christmas-themed phishing attacks leapt 327%1 around the world, while Black Friday themed phishing attacks jumped 692% compared to the beginning of November (4th – 9th November)2, as bad actors seek to take advantage of consumers and holiday brands during the busy shopping period.
Also Read:Â Secure with Simplicity: Why IT Teams Need Better Backup Processes
The United States retail sector faced an especially aggressive wave of cyber threats, with phishing attacks mimicking major holiday brands3 including Walmart, Target, and Best Buy increasing by more than 2000% during peak shopping periods.
The analysis also highlighted the shifting attention of scammers as the festive season arrives from targeting business to consumer needs, with impersonation of major consumer brands4Â growing 92% globally between the analyzed periods while mimicking of workplace focused brands5Â declined by 9%.
Brands, particularly major retailers like those analyzed, invest significantly in protecting themselves and their customers from scams and cyber attacks and often step up those measures for the holiday period. However, brand impersonation in phishing occurs entirely outside retailers’ legitimate infrastructure and security controls and happens at too great a volume for brands to catch and stop every instance. While new technologies, like AI, are helping security teams close the gap, brand impersonation remains a common challenge for brands.
“The festive shopping season creates a perfect storm for cyber criminals,” says Nathaniel Jones, VP of Threat Research, Darktrace. “Consumers are primed to expect floods of retail deals, while retailers are processing tremendous transaction volumes at speed. This combination makes spotting suspicious patterns more challenging than at any other part of the year. Bad actors taking advantage of that with brand impersonation is nothing new, but the rapidly growing volume of those attacks makes them a real worry. Both consumers and brands need to be increasingly alert to potential scams, but we can all take heart that big name retailers have some of the most sophisticated protections possible to help safeguard their customers, and technologies like AI cybersecurity, that spot spoofs and attacks that humans wouldn’t, are catching and stopping more of these attacks than ever before.”
Darktrace’s findings demonstrate some of the most common brand spoofing strategies used by attackers during the holiday season. In one strategy, brand impersonation phishing, attackers send a phishing email designed to look like a favourite retailer, enticing their target to click a link for a d*******, when in fact the link downloads malware to their device. The most effective attacks are multi-stage: brand impersonation emails lead unsuspecting shoppers directly to websites that look like the retailer but harvest login or payment details, creating a seamless deception that hands personal and financial data directly to attackers. This coordinated approach exploits the chaos of holiday sales, when shoppers are primed to expect high volumes of retail emails and website traffic promoting significant savings.
Also Read:A Comprehensive Guide to DDoS Protection Strategies for Modern Enterprises
Five essential security measures for retailers
With the festive season in full swing, retailers must stay vigilant against rising cyber threats. Here are five tips to help businesses protect themselves and their customers.
- Make logins secure:Â Firstly, ensure all staff have strong passwords (12-16 characters). Set up multi-factor verification across all business systems. This extra layer of security means even if passwords are compromised, unauthorised users can’t access your accounts during the busy retail period and use them to target your customers.
- Lock down email: Call your IT team and ask them if they have DMARC switched on. DMARC stops scammers from sending emails that look like they’re from your company and helps you see who is illegitimately sending from your email domain to protect your brand.
- Prepare your team:Â Regular security training and business wide communications help staff identify and report seasonal scams. Focus on current threats and emerging patterns – when your team knows what to look for, they become your strongest defence against cyber attacks.
- Monitor brand impersonation:Â Set up Google Alerts to track mentions of your brand and warn you of counterfeit websites and fraudulent domains. Also lock down your brand name with official registrations. This makes it easier to spot and shut down fake accounts and copycat websites. Several brand protection tools out there can help catch imposters too. Quick detection helps you respond rapidly to brand exploitation and protect your customers from sophisticated scams.
- Strengthen payment processes:Â Implement tiered access policies with stricter controls for finance team members who handle transactions. Apply more rigorous authentication and monitoring requirements compared to non-financial roles, ensuring sensitive payment operations are limited to authorized personnel.
[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]