Attackers began preparing months in advance, leveraging industrialised tools and services that enable them to scale attacks across multiple platforms, geographies, and merchant categories.
Image: Supplied.
Every year, the holiday season brings a predictable spike in online activity.
But in 2025, the volume of newly created malicious infrastructure, account compromise activity, and targeted exploitation of e-commerce systems is markedly higher.
Attackers began preparing months in advance, leveraging industrialised tools and services that enable them to scale attacks across multiple platforms, geographies, and merchant categories.
For retailers, financial institutions, and any business operating an e-commerce infrastructure, the threat landscape has never been more active or more tightly coupled to consumer behaviour.
This year’s surge in online shopping, digital payments, and promotional events creates an environment that threat actors are aggressively exploiting.
FortiGuard threat research analysed data from the past three months to identify the most significant patterns shaping the 2025 holiday threat surface.
The findings reveal a clear trend: attackers are moving faster, automating more, and capitalising fully on the seasonal surge.
This overview summarises the key insights from the new FortiRecon Cyberthreat Landscape Overview for the 2025 Holiday Season from FortiGuard Labs and offers guidance for organisations preparing for the busiest online shopping period of the year.
One of the clearest indicators of pre-holiday attacker activity is domain registration. FortiGuard identified more than 18 000 holiday-themed domains registered in the past three months, including terms such as “Christmas,” “Black Friday,” and “Flash Sale.”
At least 750 of these were confirmed as malicious. This indicates many domains are still considered non-malicious, posing a potential risk.
A parallel surge occurred among domains imitating major retail brands. Attackers registered over 19 000 e-commerce-themed domains, of which 2 900 were malicious.
Many mimic household names, often with slight variations that are easy to miss when shoppers are moving quickly.
These domains support phishing, fraudulent storefronts, gift card scams, and payment-harvesting schemes.
They also contribute to SEO poisoning campaigns that artificially inflate malicious URLs in search results during peak shopping events.
The report also shows a striking increase in the availability and use of stealer logs. Over the last three months, more than 1.57 million login accounts tied to major e-commerce sites, available through stealer logs, were collected across underground markets.
Stealer logs contain browser-stored passwords, cookies, session tokens, autofill data, and system fingerprints. During the holidays, users log in to multiple accounts across devices, making these logs especially valuable.
Criminal marketplaces now index these logs with search filters, reputation scores, and automated delivery systems. This significantly reduces the skill barrier, enabling rapid credential stuffing, account takeover, and unauthorised purchases.
The report also notes active “holiday sales” on card dumps and CVV datasets. Threat actors use Black Friday–style promotions to push stolen financial data at discounted prices, fuelling an uptick in fraud.
Attackers are actively exploiting vulnerabilities across Adobe/Magento, Oracle E-Business Suite, WooCommerce, Bagisto, and other common e-commerce platforms.
Three vulnerabilities stand out:
Across platforms, vulnerabilities in plugins, templates, and API authentication are enabling payment skimming, XSS exploitation, privilege escalation, and unauthorised file uploads. Magecart-style JavaScript injection remains one of the most persistent and damaging threats, allowing attackers to skim payment data directly from checkout pages.
This year’s threat activity is driven by a high level of automation, supported by a mature ecosystem of services that eliminates the need for attackers to build their own tools or infrastructure.
AI-powered brute-force frameworks now handle large volumes of login attempts with human-like timing and behaviour, making credential attacks more difficult to detect.
Credential validation tools tailored for WooCommerce, WordPress, FTP, SMTP, and common admin panels allow attackers to quickly test and confirm stolen usernames and passwords across entire fleets of sites.
And bulk proxy and VPN services offer rotating IP addresses and geographic diversity, which helps prevent automated activity from triggering rate limits or geofencing controls.
Instant-setup hosting for phishing pages or malware delivery has become a staple offering, providing attackers with ready-made servers that require minimal configuration.
New website-cloning services can reproduce full storefronts for use in fraud campaigns, while automated SIP platforms support high-volume vishing attempts with spoofed caller IDs.
SMS spam panels extend these capabilities into smishing campaigns, letting attackers target shoppers with fake delivery notices or discount offers.
SEO manipulation packages are also being marketed to push malicious URLs higher in search results, increasing the likelihood that hurried shoppers will click on them. In parallel, specialised services install payment skimmers or backdoors on CMS-based platforms, enabling long-term data theft.
Even the monetisation side is now being commoditised, with detailed tutorials circulating on how to convert stolen e-wallet balances and gift-card credits into cash or resalable assets.
The combined effect is a tightly integrated marketplace where attackers can prepare at scale for the holiday surge. Many of these tools and services even advertise “holiday specials,” reflecting how closely they mirror legitimate seasonal promotions.
Underground markets are showing a clear rise in listings tied to e-commerce compromise, and the scale reflects how organised these operations have become.
Threat actors are selling full customer databases pulled from breached online stores, along with millions of leaked WooCommerce records containing shopper and merchant details.
Payment tokens and customer contact information appear frequently, as do browser cookies that allow buyers to bypass passwords and multi-factor authentication (MFA) altogether.
Some listings even offer administrative or FTP access to high-revenue retail sites, giving attackers direct control over backend systems.
Others are recruiting accomplices for cash-out operations, enabling rapid laundering or monetisation of stolen balances and fraudulent purchases.
Because the holiday season brings higher transaction volumes and more rapid purchasing behaviour, compromised accounts move quickly through these markets.
Stolen sessions with active shopping histories are especially valuable, as they closely resemble legitimate user activity and are much harder to detect in real-time.
The findings show a clear pattern: attackers are operating with greater speed, automation, and commercial organisation.
The traditional holiday spike in cyber activity now intersects with large stealer-log ecosystems, commodity AI tooling, and widespread vulnerabilities in e-commerce infrastructure.
For CISOs, fraud teams, and e-commerce leaders, this is not a temporary challenge confined to the holiday window. It reflects broader trends in attacker tooling and monetisation that will persist into 2026.
A few practical steps taken early can significantly reduce the risk of fraud, account takeover, or payment-page compromise.
The following best practices outline what organisations and consumers can do to stay ahead of the most common threats during the 2025 shopping season.
Best practices for organisations
Best practices for end-users
Bhumit Mali and Aamir Lakhani, at Fortinet.
BUSINESS REPORT