As holiday shopping surges across Thanksgiving, Black Friday, Cyber Monday, and Christmas, attackers are once again ramping up operations—this time with more automation, more AI, and more ways to turn consumer distraction into profit.
Two new reports—Fortinet’s 2025 Holiday Season Cyber Threat Landscape and Darktrace’s holiday phishing analysis—reveal a concerning convergence of threat actor tactics: domain abuse, credential theft, mass phishing, e-commerce exploitation, and high-volume fraud campaigns targeting both consumers and retailers.
The data shows an unmistakable trend: holiday cybercrime is now industrialized, highly coordinated, and supported by a robust ecosystem of AI-driven tools, dark web marketplaces, and prebuilt fraud infrastructure.
Fortinet’s threat researchers observed a massive spike in malicious and suspicious holiday-themed and shopping-related domain registrations in the three months leading into the 2025 season:
18,000+ newly registered holiday-themed domains, with 750+ (4%) classified as malicious—many mimicking themes such as “Christmas,” “Black Friday,” and “FlashSale."
19,000+ newly registered e-commerce-themed domains, of which 2,900+ (15%) were malicious.
These domains fuel phishing, fake storefronts, credential harvesting, and gift-card fraud campaigns. Attackers use SEO poisoning, website cloning, and AI to create believable, high-traffic scam sites.
Fortinet’s analysis found 1.57 million stolen e-commerce account credentials circulating on dark web marketplaces in the past quarter alone, including:
Full credential logs
Active session cookies
Stored autofill payment data
Email logins
Crypto wallet details
These “stealer logs” enable instant account takeover (ATO), bypass MFA through active sessions, and open the door to fraudulent purchases during peak holiday activity.
Attackers are also selling credit card CVVs, dumps, and combo lists, often at discounted “Black Friday” prices to encourage bulk purchases by fraud rings.
Fortinet documents widespread adoption of AI-driven attack tooling, including:
AI-powered brute-force frameworks that mimic human behavior
Credential checkers for validating stolen WooCommerce, FTP, or WordPress logins
AI-driven phishing mailers designed to evade spam detection
Automated website cloning services
Sniffer (credit card skimmer) installation kits for Magento, Shopify, WooCommerce
These tools lower technical barriers and enable “one-click” fraud operations tailored to holiday shopping surges.
While Fortinet tracked infrastructure and marketplace activity, Darktrace observed massive increases in email-based attacks targeting holiday retail shoppers:
Phishing attacks targeting Black Friday shoppers jumped 620% in November.
54% month-over-month rise in phishing impersonating major festive retailers such as Walmart, Macy’s, and Best Buy.
Amazon impersonation accounted for 80% of all brand-impersonating phishing campaigns.
Darktrace warns that phishing volume was expected to rise another 20–30% during actual Black Friday week.
The most pervasive campaign? A fake brand called “Deal Watchdogs”—emails sent from deceptive domains promising can’t-miss holiday discounts, redirecting users to realistic-looking Amazon phishing sites.
Darktrace notes these are not the sloppy scam emails of years past. AI now enables attackers to perfectly match tone, branding, and timing—making detection nearly impossible without advanced email security.
Fortinet highlights that cybercriminals aggressively exploit newly disclosed and high-impact vulnerabilities across e-commerce technologies:
CVE-2025-54236 (Adobe/Magento) – session takeover + RCE; over 250 stores compromised.
CVE-2025-61882 (Oracle EBS) – unauthenticated RCE used by Clop ransomware to compromise ERP systems.
Major weaknesses include:
Magecart-style JavaScript skimmers
API authorization flaws
Payment form interceptors
XSS injection enabling credential theft
Depot and warehouse backend exploitation
Attackers also sell admin-level access to high-revenue U.S. retail e-commerce companies—including full FTP access for systems generating over $6.5B annually.
The Takeaway: Holiday Cybercrime Is Now a Fully Automated Industry
Together, Fortinet and Darktrace paint a clear picture:
Threat actors treat the holidays as their own “peak season,” leveraging automation, AI, and prebuilt infrastructure to maximize profit.
The attack surface is vast, spanning:
Phishing
Malicious domains
Stolen credentials
Card fraud
Gift card scams
Website cloning
Sniffers/JavaScript skimmers
RCE exploitation
SMS/vishing infrastructure
For defenders, this is a period requiring heightened vigilance, rapid patching, and increased monitoring across identity, email, web, and third-party ecosystems.
Here's a simple, high-impact checklist cybersecurity leaders can share with employees, friends, and family.
Double-check domain names — watch for subtle misspellings or strange extensions.
Never click links in unsolicited emails or texts—navigate manually to retailer sites.
Avoid “too good to be true” offers—especially luxury items or large discounts.
Use credit cards over debit cards for better fraud protection.
Enable MFA everywhere, especially on Amazon, Apple, and banking apps.
Beware of urgent countdown timers—pressure tactics are common.
Check for “https://” and valid certificates before entering payment info.
Use a password manager to avoid reusing credentials across sites.
Avoid shopping on public Wi-Fi—use your mobile hotspot instead.
Monitor bank and credit card activity daily during the holiday period.
Monitor for brand impersonation domains (Fortinet’s 37k+ domain surge is a warning).
Increase email filtering sensitivity during November–December.
Alert employees about phishing lures impersonating Amazon and major retailers.
Patch critical e-commerce and CMS CVEs immediately.
Watch for anomalous logins from validated stolen credentials.
Deploy anti-skimming protections on payment pages.
Review incident response plans for fraud and account takeover scenarios.
The 2025 data from Fortinet and Darktrace confirms that holiday cybercrime is becoming faster, more automated, and more convincing than ever before. Retailers, banks, e-commerce platforms, and consumers are all in the crosshairs.
Cybersecurity teams should prepare for:
More AI-generated phishing
More credential-stuffing attacks
More malicious domains
More exploitation of new CVEs
More fraud operations fueled by stolen data
With informed employees, proactive monitoring, and strong email and identity protections in place, organizations can significantly reduce the risk posed by this annual wave of cyber activity.
We asked some cybersecurity vendor SMEs for their thoughts on increasing holiday scams:
Will Glazier, Head of CQ Prime Threat Research Team at Cequence Security:
Nivedita Murthy, Senior Staff Consultant at Black Duck:
Anne Cutler, Cybersecurity Evangelist at Keeper Security:
Nick France, Chief Technology Officer at Sectigo: