Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

5 Ways Identity-based Attacks Are Breaching Retail

Posted on July 8, 2025July 8, 2025 By CWS

From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping by the cracks of belief and entry. This is how 5 retail breaches unfolded, and what they reveal about…
In latest months, main retailers like Adidas, The North Face, Dior, Victoria’s Secret, Cartier, Marks & Spencer, and Co‑op have all been breached. These assaults weren’t refined malware or zero-day exploits. They had been identity-driven, exploiting overprivileged entry and unmonitored service accounts, and used the human layer by ways like social engineering.
Attackers did not want to interrupt in. They logged in. They moved by SaaS apps unnoticed, typically utilizing actual credentials and bonafide periods.
And whereas most retailers did not share all of the technical particulars, the patterns are clear and recurring.
This is a breakdown of the 5 latest high-profile breaches in retail:
1. Adidas: Exploiting third-party belief
Adidas confirmed a knowledge breach attributable to an assault on a third-party customer support supplier. The corporate mentioned buyer information was uncovered, together with names, electronic mail addresses, and order particulars. No malware. No breach on their aspect. Simply the blast radius of a vendor they trusted.
How these assaults unfold in SaaS identities:
SaaS tokens and repair accounts granted to distributors typically do not require MFA, do not expire, and fly beneath the radar. As soon as entry is now not wanted however by no means revoked, they grow to be silent entry factors, excellent for provide chain compromises that map to ways like T1195.002, giving attackers a manner in with out setting off alarms.
Safety takeaway:
You are not simply securing your customers. You are securing the entry that distributors depart behind, too. SaaS integrations stick round longer than the precise contracts, and attackers know precisely the place to look.
2. The North Face: From password reuse to privilege abuse
The North Face confirmed a credential stuffing assault (MITRE T1110.004) the place risk actors used leaked credentials (usernames and passwords) to entry buyer accounts. No malware, no phishing, simply weak id hygiene and no MFA. As soon as inside, they exfiltrated private information, exposing a serious hole in primary id controls.
How these assaults unfold in SaaS identities:
SaaS logins with out MFA are nonetheless all over the place. As soon as attackers get legitimate credentials, they’ll entry accounts straight and quietly, no want triggering endpoint protections or elevating alerts.

Safety takeaway:
Credential stuffing is nothing new. It was the fourth credential-based breach for The North Face since 2020. Each is a reminder that password reuse with out MFA is a wide-open door. And whereas loads of orgs implement MFA for workers, service accounts, and privileged roles, many occasions they go unprotected. Attackers realize it, they usually go the place the gaps are.

Wish to go deeper? Obtain the ‘SaaS Identification Safety Information’ to discover ways to proactively safe each id, human or non-human, throughout your SaaS stack.

3. M&S & Co-op: Breached by borrowed belief
UK retailers Marks & Spencer and Co-op had been reportedly focused by the risk group Scattered Spider, recognized for identity-based assaults. Based on experiences, they used SIM swapping and social engineering to impersonate workers and trick IT assist desks into resetting passwords and MFA, successfully bypassing MFA, all with out malware or phishing.
How these assaults unfold in SaaS identities:
As soon as attackers bypass MFA, they aim overprivileged SaaS roles or dormant service accounts to maneuver laterally throughout the group’s methods, harvesting delicate information or disrupting operations alongside the way in which. Their actions mix in with official person conduct (T1078), and with password resets pushed by assist desk impersonation (T1556.003), they quietly acquire persistence and management with out elevating any alarms.
Safety takeaway:
There is a motive identity-first assaults are spreading. They exploit what’s already trusted, and infrequently depart no malware footprint. To cut back danger, monitor SaaS id conduct, together with each human and non-human exercise, and restrict assist desk privileges by isolation and escalation insurance policies. Focused coaching for help workers may also block social engineering earlier than it occurs.

4. Victoria’s Secret: When SaaS admins go unchecked
Victoria’s Secret delayed its earnings launch after a cyber incident disrupted each e-commerce and in-store methods. Whereas few particulars had been disclosed, the influence aligns with situations involving inner disruption by SaaS methods that handle retail operations, like stock, order processing, or analytics instruments.
How these assaults unfold in SaaS identities:
The true danger is not simply compromised credentials. It is the unchecked energy of overprivileged SaaS roles. When a misconfigured admin or stale token will get hijacked (T1078.004), attackers do not want malware. They’ll disrupt core operations, from stock administration to order processing, all throughout the SaaS layer. No endpoints. Simply destruction (T1485) at scale.
Safety takeaway:
SaaS roles are highly effective and infrequently forgotten. A single overprivileged id with entry to important enterprise functions can set off chaos, making it essential to use stringent entry controls and steady monitoring to those high-impact identities earlier than it is too late.
5. Cartier & Dior: The hidden value of buyer help
Cartier and Dior disclosed that attackers accessed buyer data by way of third-party platforms used for CRM or customer support features. These weren’t infrastructure hacks; they had been breaches by platforms meant to assist clients, not expose them.
How these assaults unfold in SaaS identities:
Buyer help platforms are sometimes SaaS-based, with persistent tokens and API keys quietly connecting them to inner methods. These non-human identities (T1550.003) not often rotate, typically escape centralized IAM, and grow to be simple wins for attackers focusing on buyer information at scale.
Safety takeaway:
In case your SaaS platforms contact buyer information, they’re a part of your assault floor. And for those who’re not monitoring how machine identities entry them, you are not defending the frontlines.
Ultimate Thought: Your SaaS identities aren’t invisible. They’re simply unmonitored.
Your SaaS identities aren’t invisible; they’re simply unmonitored. These breaches did not want fancy exploits. They simply wanted a misplaced belief, a reused credential, an unchecked integration, or an account nobody reviewed.
Whereas safety groups have locked down endpoints and hardened SaaS logins, the actual gaps lie in these hidden SaaS roles, dormant tokens, and ignored assist desk overrides. If these are nonetheless flying beneath the radar, the breach already has a head begin.
Wing Safety was constructed for this.
Wing’s multi-layered platform constantly protects your SaaS stack, discovering blind spots, hardening configurations, and detecting SaaS id threats earlier than they escalate.
It is one supply of reality that connects the dots throughout apps, identities, and dangers, so you’ll be able to lower by the noise and cease breaches earlier than they begin.
👉 Get a demo of Wing Safety to see what’s hiding in your SaaS id layer.

Discovered this text attention-grabbing? This text is a contributed piece from one among our valued companions. Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Attacks, Breaching, IdentityBased, Retail, Ways

Post navigation

Previous Post: RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks
Next Post: Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites

Related Posts

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions The Hacker News
RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks The Hacker News
Why top SOC teams are shifting to Network Detection and Response The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover
  • Exploits, Technical Details Released for CitrixBleed2 Vulnerability
  • PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover
  • Exploits, Technical Details Released for CitrixBleed2 Vulnerability
  • PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News