Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/9/2019
12:20 PM
50%
50%

Cybercriminals Target Budding Cannabis Retailers

Companies in the young, rapidly growing industry are targeted for sensitive information they store and immature security practices.

As more US states legalize recreational marijuana, security experts warn lawful cannabis retailers of their vulnerabilities to cyberattacks targeting consumer and patient information.

Thirty-four states sell marijuana for medicinal purposes; in January 2020, Illinois will become the eleventh to sell cannabis via state-licensed dispensaries. As Matthew Dunn, associate managing director for cyber risk at Kroll, says, "legitimate cannabis enterprises have all the responsibilities of a traditional business." This means being aware of exposure to cybercrime.

"While they share with all retailers the duty to protect customer data and financial records, cannabis businesses must acknowledge a heightened state of sensitivity around privacy issues," he writes. Dunn argues dispensaries face greater risk due to the controversial product they sell; as a result, it's "imperative" they develop a mature cybersecurity strategy to mitigate risk.

The threat is greater for medicinal marijuana dispensaries, which store protected health information (PHI) records that are considered more valuable to attackers than typical PII due to the extent of health data they contain. Medicinal dispensaries aren't covered under HIPAA, which would limit how they use patient data, but they still must comply with state privacy laws.

What should cannabis retailers watch for? Dunn points to the danger of email-based attacks, which affect retailers across industries but may prove especially prevalent among cannabis companies with relatively new workforces. Cyber extortion is another threat: criminals who access a dispensary's client database could attempt to extort high-profile customers, he adds.

Also top-of-mind is the heightened risk of IoT attacks as many cannabis retailers use video surveillance equipment that connects to the Internet. While IoT devices offer convenience and flexibility of remote access, Dunn points out how many use default login credentials and oftentimes multiple employees will use the same password to access databases and platforms.

Read more details here.

  

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11749
PUBLISHED: 2020-07-13
Pandora FMS 7.0 NG <= 746 suffers from Multiple XSS vulnerabilities in different browser views. A network administrator scanning a SNMP device can trigger a Cross Site Scripting (XSS), which can run arbitrary code to allow Remote Code Execution as root or apache2.
CVE-2020-5766
PUBLISHED: 2020-07-13
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.
CVE-2020-15689
PUBLISHED: 2020-07-13
Appweb before 7.2.2 and 8.x before 8.1.0, when built with CGI support, mishandles an HTTP request with a Range header that lacks an exact range. This may result in a NULL pointer dereference and cause a denial of service.
CVE-2019-4591
PUBLISHED: 2020-07-13
IBM Maximo Asset Management 7.6.0 and 7.6.1 does not invalidate session after logout which could allow a local user to impersonate another user on the system. IBM X-Force ID: 167451.
CVE-2019-20907
PUBLISHED: 2020-07-13
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.