Key Takeaways
- 77% of retail organizations were hit by ransomware in 2022, up from 44% in 2021
- The average ransom payment in the retail sector is $438,302
- Nearly 50% of retail cyberattacks involve the use of malware to exfiltrate customer data
- 37% of retail data breaches involve the use of stolen credentials
- The average cost of a data breach in the retail industry is $3.28 million
- It takes an average of 207 days for a retailer to identify a data breach
- Phishing accounts for 36% of all cyberattacks directed at the retail sector
- 1 in every 95 emails received by retail employees is a phishing attempt
- 86% of retail organizations were targeted by at least one successful phishing attack in 2022
- Retailers faced 115 billion credential stuffing attacks in 2022-2023
- 30% of all global bot traffic is directed at the retail industry
- Account Takeover (ATO) attacks against retailers increased by 110% year-over-year
- Retail security budgets increased by an average of 9% in 2023
- 65% of retailers are not fully compliant with the latest version of PCI DSS 4.0
- The average retailer uses 75 different security tools across their infrastructure
Ransomware attacks on retailers are rising sharply in cost and complexity.
Compliance & Infrastructure
Compliance & Infrastructure Interpretation
Data Breaches & Privacy
Data Breaches & Privacy Interpretation
E-commerce & Bot Attacks
E-commerce & Bot Attacks Interpretation
Phishing & Social Engineering
Phishing & Social Engineering Interpretation
Ransomware & Malware
Ransomware & Malware Interpretation
Sources & References
- Reference 1SOPHOSsophos.comVisit source
- Reference 2VERIZONverizon.comVisit source
- Reference 3CROWDSTRIKEcrowdstrike.comVisit source
- Reference 4SONICWALLsonicwall.comVisit source
- Reference 5IBMibm.comVisit source
- Reference 6CHECKPOINTcheckpoint.comVisit source
- Reference 7PROOFPOINTproofpoint.comVisit source
- Reference 8ZSCALERzscaler.comVisit source
- Reference 9RECORDEDFUTURErecordedfuture.comVisit source
- Reference 10BITDEFENDERbitdefender.comVisit source
- Reference 11FORTINETfortinet.comVisit source
- Reference 12TENABLEtenable.comVisit source
- Reference 13PALOALTONETWORKSpaloaltonetworks.comVisit source
- Reference 14MALWAREBYTESmalwarebytes.comVisit source
- Reference 15MANDIANTmandiant.comVisit source
- Reference 16KNOWBE4knowbe4.comVisit source
- Reference 17F5f5.comVisit source
- Reference 18THALESGROUPthalesgroup.comVisit source
- Reference 19SECURITYSCORECARDsecurityscorecard.comVisit source
- Reference 20TRUSTWAVEtrustwave.comVisit source
- Reference 21AKAMAIakamai.comVisit source
- Reference 22IMPERVAimperva.comVisit source
- Reference 23FBIfbi.govVisit source
- Reference 24BARRACUDAbarracuda.comVisit source
- Reference 25AHTAVALOahtavalo.comVisit source
- Reference 26AGARIagari.comVisit source
- Reference 27LOOKOUTlookout.comVisit source
- Reference 28IRONSCALESironscales.comVisit source
- Reference 29CYBINTSOLUTIONScybintsolutions.comVisit source
- Reference 30GARTNERgartner.comVisit source
- Reference 31MICROSOFTmicrosoft.comVisit source
- Reference 32IVANTIivanti.comVisit source
- Reference 33LASTPASSlastpass.comVisit source
- Reference 34HUMANSECURITYhumansecurity.comVisit source
- Reference 35DATADOMEdatadome.coVisit source
- Reference 36NETACEAnetacea.comVisit source
- Reference 37SANSECsansec.ioVisit source
- Reference 38FEROOTferoot.comVisit source
- Reference 39SALTsalt.securityVisit source
- Reference 40SYNOPSYSsynopsys.comVisit source
- Reference 41BAYMARDbaymard.comVisit source
- Reference 42SYMANTECsymantec.comVisit source
- Reference 43CLOUDFLAREcloudflare.comVisit source
- Reference 44MARSHmarsh.comVisit source
- Reference 45FLEXERAflexera.comVisit source
- Reference 46DELOITTEdeloitte.comVisit source
- Reference 47TRENDMICROtrendmicro.comVisit source
- Reference 48DLAPIPERdlapiper.comVisit source
- Reference 49ISC2isc2.orgVisit source
- Reference 50OKTAokta.comVisit source
- Reference 51UPTIMEINSTITUTEuptimeinstitute.comVisit source






