Retailers Unprepared for AI-Powered Cyberattack Tsunami, Report Warns

New LevelBlue Report Finds Retail Sector Facing Surge in AI-Driven Threats Amidst Critical Preparedness Gap

MEDIUM
November 13, 2025
5m read
Threat IntelligencePhishingSupply Chain Attack

Related Entities

Organizations

LevelBlue

Products & Tech

Artificial IntelligenceDeepfakes

Other

HarrodsMarks & SpencerVictoria's Secret

Full Report

Executive Summary

A new report from managed security services provider LevelBlue, titled "2025 Spotlight Report: Aligning Cyber Resilience and Business Goals in Retail," paints a concerning picture of the retail industry's cybersecurity posture. The study, which surveyed 220 retail executives, reveals that retailers are facing a higher volume and complexity of attacks, largely driven by threat actors' adoption of Artificial Intelligence (AI). Key findings indicate that 44% of retailers have seen a surge in attacks and 34% suffered a data breach in the last year. Most alarmingly, the report exposes a significant 'preparedness deficit': while executives anticipate sophisticated AI-driven attacks like deepfakes, few feel their organizations are equipped to handle them. This, combined with poor supply chain visibility, puts the entire sector at heightened risk.


Threat Intelligence Overview

The report highlights several key trends and statistics that define the current threat landscape for retailers:

  • Increased Attack Volume: 44% of retailers reported a significant increase in the volume of cyberattacks.
  • AI-Powered Threats: 45% of executives expect to face AI-driven attacks, but only 25% feel prepared. This gap is critical as AI enables more convincing phishing, faster vulnerability discovery, and automated attack campaigns.
  • Deepfakes and Synthetic Identity: 44% anticipate incidents involving deepfakes, but only 33% are prepared. This suggests a major risk for social engineering and fraud, as two-thirds of executives noted it is harder for employees to distinguish real from fake communications.
  • Supply Chain Weakness: A staggering 47% of retailers admitted to having low or moderate visibility into their suppliers' security posture. This is a massive blind spot, as a compromise at a single supplier can impact dozens of retailers.

These findings suggest that while retailers are aware of emerging threats, their defensive capabilities and strategic priorities are not keeping pace.

Impact Assessment

The consequences of this preparedness gap are severe. A successful AI-powered phishing campaign or a supply chain attack could lead to:

  • Large-Scale Data Breaches: Compromise of customer PII, payment card information, and loyalty program data, leading to massive regulatory fines (e.g., GDPR, CCPA) and reputational damage.
  • Financial Fraud: Use of synthetic identities and deepfakes to commit return fraud, account takeover, or social engineering against finance departments.
  • Operational Disruption: Ransomware attacks originating from a compromised supplier could halt point-of-sale systems, e-commerce platforms, and warehouse operations, leading to significant revenue loss, especially during peak seasons.
  • Loss of Customer Trust: High-profile breaches, such as those that have recently affected retailers like Harrods and Marks & Spencer, erode consumer confidence and can permanently damage a brand.

Detection & Response

To counter these advanced threats, retailers must evolve their security operations:

  • AI for Defense: Fight AI with AI. Deploy security tools that use machine learning to detect anomalous behavior, such as unusual login patterns or data access, which could indicate a compromised account. Use D3FEND's User Behavior Analysis.
  • Enhanced Phishing Detection: Implement email security solutions capable of detecting signs of AI-generated content and performing deep analysis of links and attachments. Use D3FEND's URL Analysis.
  • Supply Chain Monitoring: Actively monitor for breaches at key suppliers. Use threat intelligence services to be alerted if a supplier's credentials or data appear on the dark web.

Mitigation and Strategic Recommendations

  1. Prioritize Supply Chain Security (M0952 - Supply Chain Risk Management): Retailers must move beyond simple contractual assurances. Mandate security assessments and a 'right to audit' for all critical suppliers. Require suppliers to provide a Software Bill of Materials (SBOM) for any software integrated into the retailer's environment.
  2. Invest in AI-Specific Training (M1017 - User Training): Standard phishing training is no longer sufficient. Train employees, especially those in finance and HR, to recognize the signs of sophisticated deepfake audio/video and AI-generated text. Use simulations to test their awareness.
  3. Adopt a Zero Trust Architecture (M1030 - Network Segmentation): Assume that a breach will occur. Implement network segmentation to limit an attacker's ability to move laterally from a compromised system (e.g., a supplier's portal) to critical systems like payment processing or customer databases.
  4. Strengthen Identity and Access Management (M1032 - Multi-factor Authentication): Enforce phishing-resistant MFA for all employees and, critically, for all third-party and supplier accounts that have access to the retailer's network or data. This is a foundational control against credential-based attacks.

Timeline of Events

1
November 13, 2025
This article was published

MITRE ATT&CK Mitigations

Directly addresses the finding that 47% of retailers have poor visibility into supplier security.

Crucial for defending against more sophisticated AI-driven phishing and deepfake attacks.

A foundational control to protect against credential theft, regardless of how the credentials were obtained.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat AI-driven threats that may lead to account takeover, retailers must move beyond static rules and analyze behavior. By implementing a User and Entity Behavior Analytics (UEBA) solution, security teams can establish a baseline of normal activity for each user and role. The system can then detect anomalies, such as an accountant suddenly trying to access product development servers or a store manager logging in from an unusual country. This technique is effective against AI-powered attacks because even if an attacker creates a perfect replica of a legitimate communication, their post-compromise behavior will likely deviate from the real user's established pattern. Alerting on such deviations provides a high-fidelity signal of a potential breach.

Given that nearly half of retailers lack visibility into their supply chain, formalizing an SCRM program is no longer optional. Retailers must create an inventory of all third-party suppliers with access to their data or networks. Implement a tiered system to classify suppliers based on risk and conduct security assessments proportional to that risk. For high-risk suppliers, mandate security questionnaires, penetration test results, and evidence of a mature security program. Write security requirements, including breach notification timelines, directly into contracts. This programmatic approach is the only way to manage the systemic risk identified in the LevelBlue report and protect the business from a breach originating outside its own walls.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RetailAIArtificial IntelligenceDeepfakeSupply ChainThreat IntelligenceLevelBlue

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading