Week 8: Identity-based Attacks Breaching Retail

5 Ways Identity-based Attacks Are Breaching Retail 

Exploiting Third‑Party Trust (Adidas)

Attackers gained access through a vendor’s SaaS integration using stale tokens/service accounts that lacked MFA or expiration. This supply-chain style breach exposed customer data without any malware—just unchecked trust in third parties 


Credential Stuffing & Privilege Abuse (The North Face)

Using leaked username/password combos, attackers accessed customer accounts via credential stuffing. With no MFA protection, they quietly extracted PII—demonstrating how weak identity hygiene opens doors. 

 

SIM Swapping & Social Engineering (Marks & Spencer, Co‑op)

Threat group Scattered Spider tricked help desk staff using SIM swap and impersonation, resetting MFA and password protections. This kind of human-layer trickery granted lateral access through overprivileged or dormant SaaS identities

 

Hijacked Unmonitored SaaS Admins (Victoria’s Secret)

Although details are sparse, attackers likely targeted high-privilege SaaS admin roles or tokens, leveraging overprivileged and unmonitored identities to disrupt e-commerce and in-store systems—all without deploying malware 

 

Third‑Party CRM Token Abuse (Cartier & Dior)

By targeting persistent tokens/API keys used by external CRM/CS platforms, attackers accessed customer data at scale. These non-human identities typically fall outside centralized IAM and often go unrotated 

 

Best Practices:

  1. Identity-first audits: Discover and inventory every identity—human and non-human.

  2. Adaptive/cloud-aware MFA: Use phishing-resistant methods like FIDO2 or biometric authentication.

  3. Enforce least-privilege: Regular access reviews and prompt decommissioning of unused permissions.

  4. Secure help‑desk channels: Add behavioral verification layers; segregate high-risk actions from standard support.

  5. Behavioral anomaly detection: Implement Identity Threat Detection and Response (ITDR) for login/session irregularities. 

 

Resources: https://thehackernews.com/2025/07/5-ways-identity-based-attacks-are.html 

 

Comments

Popular posts from this blog

Week 3- Attackers Impersonate as Managed Devices

Week 7: Data Privacy

Week 4: Cyber Supply Chain Risk Management