AI didn't invent cyberattacks. It industrialized them.
In 2025, one in six data breaches involved AI-powered attack techniques. Attackers used generative AI for phishing in 37% of those cases and deepfake impersonation in 35%. The average cost of an AI-related breach hit $4.62 million — $180,000 more than the global average (IBM, 2025).
Cannabis businesses are particularly vulnerable because they combine high-value targets (cash, customer PII, government IDs) with historically weak defenses and high employee turnover that limits institutional security knowledge.
How AI is being used against cannabis operators
AI-generated phishing that your staff can't detect
The days of obvious phishing emails with broken English are over. AI generates grammatically perfect, contextually aware emails that mimic your vendors, your bank, your state regulator, even your POS provider. An email that says "Your METRC API credentials need to be revalidated due to a system migration — click here to verify" is indistinguishable from a real notice. Phishing was the most common attack vector in 2025, accounting for 16% of all breaches with an average cost of $4.8 million per incident.
Deepfake voice calls targeting dispensary managers
Voice cloning technology can now replicate a person's voice from as little as 3 seconds of audio — a voicemail, a podcast appearance, a social media video. Attackers are using cloned voices to call dispensary managers impersonating owners, regional directors, or vendors and requesting urgent wire transfers, credential changes, or access grants. Your receptionist can't tell the difference. Neither can your GM.
AI-powered reconnaissance
Attackers use AI to scrape cannabis license databases, social media profiles, job postings, and vendor directories to build detailed profiles of your operation — who works there, what systems you use, who your vendors are, and where the gaps might be. A job posting that says "experience with Dutchie and METRC required" tells an attacker exactly what POS system you run and what API connections to target.
Automated vulnerability scanning at scale
AI enables attackers to scan thousands of cannabis business networks simultaneously, identifying exposed ports, unpatched systems, and misconfigured cloud services. What used to take a skilled attacker days now takes minutes. Cannabis companies with public-facing cameras, guest WiFi portals, or online ordering systems are particularly exposed.
Why cannabis is a preferred AI attack target
Ransomware groups don't choose targets randomly. Cannabis checks every box: government-issued IDs and purchase histories create high-value data for identity theft, federal illegality means victims are less likely to involve law enforcement, cash-heavy operations signal weak financial controls and limited cybersecurity investment, high turnover means constantly rotating staff who may not recognize sophisticated social engineering, and immature IT infrastructure with flat networks, shared logins, and minimal monitoring.
What you can do about it
AI attacks require AI-caliber defenses. Deploy email security with AI-powered link analysis and behavioral detection — not just signature-based spam filters. Implement voice verification protocols for any request involving money, credentials, or access changes — no single phone call should authorize a wire transfer. Train staff on AI-specific threats, not just 2015-era phishing awareness. Run simulated AI phishing campaigns to test your team. Minimize your public attack surface — audit job postings, social media, and vendor directories for information that helps attackers profile your operation. And monitor continuously: 24/7 SOC monitoring catches the AI-generated attack that bypasses your email filter at 2 AM on a Saturday.
Need help with this?
710IT builds cannabis IT infrastructure that addresses every issue covered in this article. Book a free assessment and we'll evaluate your current posture.
This article is for informational purposes only and does not constitute legal, cybersecurity, or professional advice. Requirements vary by state and change frequently. Always consult qualified professionals for advice specific to your jurisdiction.