Real breaches. Real lessons.
Don't be next.
Cannabis cybersecurity incidents from 2020–2026. Each report highlights what happened, how it happened, and what your operation should learn from it.
STIIIZY — Everest Ransomware Attack
The Everest ransomware gang compromised a POSPoint of Sale — the system where dispensary transactions and compliance reporting happen. processing vendor, exfiltrating data over 30 days before detection. Exposed: names, driver's licenses, passports, medical cannabis cards, and full purchase histories. STIIIZY refused to pay ransom. Data was leaked publicly. A federal class action lawsuit followed.
Ohio Marijuana Card — Unsecured Database
An unsecured database exposed SSNs, medical intake forms, physician certifications, and mental health evaluations — the largest cannabis data exposure ever discovered. No encryption. No access controls. Just an open database on the internet.
THSuite — Exposed S3 Bucket
A seed-to-sale tracking platform left an Amazon S3 bucket publicly accessible. Exposed data included government IDs, purchase histories, and personal information from dispensaries across multiple states.
MJ Freeway — Dual Hacks
The seed-to-sale tracking platform was hacked twice. Source code was posted publicly. Operations for over 1,000 dispensaries across 23 states were disrupted. The company eventually rebranded.
MariMed — Business Email Compromise
A business email compromise attack intercepted communications and redirected $650,000 in wire transfers. No technical hack required — just social engineering.
How would your operation handle a breach?
Book a free cybersecurity assessment. We'll identify your exposure and build a defense plan — before attackers find the gaps first.
Book Free Assessment →