The 10 Biggest Cannabis Data Breaches: Case Studies Every Dispensary Owner Must Know

The 10 Biggest Cannabis Data Breaches: Case Studies Every Dispensary Owner Must Know
Photo by Bermix Studio / Unsplash

Why These Breaches Matter to Your Business

The cannabis industry has a data breach problem. And it's getting worse.

Since legalization began spreading across states and countries, the industry has accumulated a troubling track record of exposing customer data, patient records, employee information, and business-critical systems. These aren't hypothetical threats—they're documented incidents that cost real businesses millions of dollars and exposed millions of people to identity theft, fraud, and privacy violations.

For medical dispensaries, the stakes are even higher. Patient health information carries HIPAA-level protection requirements, and the stigma still attached to cannabis use means exposure can have life-altering consequences for customers.

This article examines the 10 most significant data breaches in cannabis history, what went wrong, and—most importantly—what you can learn to protect your business.


Case Study #1: STIIIZY (2024)

The Breach at a Glance

Detail Information
Company STIIIZY (Los Angeles-based cannabis retailer)
Date Discovered November 20, 2024
Attack Window October 10 - November 10, 2024
Records Exposed 380,000 customers
Attack Vector Point-of-sale vendor compromise
Threat Actor Everest Ransomware Group

What Happened

STIIIZY, one of California's largest cannabis operators, learned in late November 2024 that their point-of-sale processing vendor had been compromised by an organized cybercrime group. The attackers gained access to customer data for approximately one month before detection.

The breach affected four STIIIZY retail locations in California and exposed an extraordinarily comprehensive set of customer data.

Data Exposed

  • Full names, addresses, and dates of birth
  • Driver's license numbers
  • Passport numbers
  • Photographs from government IDs
  • Signatures from government IDs
  • Medical cannabis card details
  • Complete transaction histories

This level of exposure is particularly devastating because it provides everything needed for sophisticated identity theft and fraud.

Key Lessons

Third-party risk is your risk. STIIIZY's own systems weren't directly breached—their vendor was. But from the customer's perspective, STIIIZY failed to protect their data. You are responsible for the security of every vendor that touches your customer information.

POS systems are prime targets. Point-of-sale systems process the most sensitive customer data and are consistently targeted by attackers. Segment these systems, monitor them closely, and hold vendors to strict security standards.

The Everest gang is targeting cannabis. Within one week of the STIIIZY disclosure, a second cannabis operator appeared on Everest's dark web victim blog—listed as a client of the first victim's vendor. This wasn't random—the cannabis industry is now explicitly on their target list.

The Complete Dispensary Cybersecurity Hardening Guide: Protect Your Business Before You’re the Next Stiiizy
420,000+ customer records exposed. Passports leaked. Purchase histories published. Don’t let this happen to you. The Wake-Up Call: Stiiizy Breach (January 2025) On January 10, 2025, Stiiizy—one of the largest cannabis brands in California—confirmed a devastating data breach. The Everest ransomware gang stole data from over 420,

Case Study #2: Ohio Marijuana Card (2025)

The Breach at a Glance

Detail Information
Company Ohio Medical Alliance LLC (Ohio Marijuana Card)
Date Discovered July 2025
Records Exposed ~1 million patient files (323 GB)
Attack Vector Unsecured database (no password, no encryption)
Threat Actor None required—data was publicly accessible

What Happened

In July 2025, cybersecurity researcher Jeremiah Fowler discovered an unsecured database belonging to Ohio Marijuana Card, an organization that helps individuals obtain physician-certified medical marijuana cards. The database was completely unprotected—no password, no encryption, no firewall.

The 323-gigabyte database sat exposed on the open internet, containing nearly one million patient files.

Data Exposed

  • Full names and Social Security numbers
  • Dates of birth and home addresses
  • Driver's license images
  • Medical intake forms
  • Physician certifications
  • Internal staff notes
  • Offender release cards (for people reentering society after incarceration)
  • 200,000+ email addresses of employees, business associates, and customers

Key Lessons

Basic security hygiene matters most. This wasn't a sophisticated attack—the database was simply left open. Password protection and encryption are baseline requirements, not optional extras.

Medical cannabis data requires healthcare-level security. When you're collecting medical intake forms and physician certifications, you're handling protected health information. The security standards of traditional healthcare should apply.

Vulnerable populations face amplified harm. The exposure of offender release cards shows how cannabis data breaches can disproportionately harm already vulnerable populations.


Case Study #3: THSuite (2020)

The Breach at a Glance

Detail Information
Company THSuite (point-of-sale software for dispensaries)
Date Discovered December 24, 2019
Date Secured January 14, 2020
Records Exposed 30,000+ individuals confirmed (likely more)
Attack Vector Unsecured Amazon S3 bucket
Dispensaries Affected Amedicanna Dispensary (MD), Bloom Medicinals (OH), Colorado Grow Company (CO), and potentially all THSuite clients

What Happened

Security researchers from vpnMentor discovered an unsecured Amazon S3 bucket belonging to THSuite, a point-of-sale software company serving cannabis dispensaries. The bucket contained so much data that researchers couldn't examine all records individually.

THSuite never responded to the disclosure. The bucket was only secured after researchers contacted Amazon directly.

Data Exposed

Patient/Customer Information:

  • Full names, phone numbers, dates of birth
  • Medical ID numbers
  • Scanned government-issued photo IDs
  • Signatures
  • Patient attestations acknowledging state cannabis laws
  • Gram limits and purchase records

Business Information:

  • Monthly sales reports and compliance reports
  • Inventory lists with product names, descriptions, costs
  • Employee payroll records and hours worked
  • Sales breakdowns by payment method and product type

Key Lessons

Cloud misconfigurations are epidemic. Amazon S3 bucket misconfigurations are one of the most common causes of data breaches across all industries. If you use cloud storage, verify your security settings.

Vendor responsiveness matters. THSuite's failure to respond to the security disclosure is a red flag. When evaluating vendors, ask about their vulnerability disclosure process and incident response capabilities.

The exposure extends beyond customers. Employee payroll data, business financials, and operational details were all exposed—creating risks for everyone connected to the dispensaries.


Case Study #4: MJ Freeway (2016-2018)

The Breach at a Glance

Detail Information
Company MJ Freeway (seed-to-sale tracking software)
Attack Window November 2016 - 2018 (multiple incidents)
Dispensaries Affected 1,000+ clients in 23 states
Attack Types Data theft, system destruction, source code theft
State Contracts Affected Pennsylvania, Washington, others

Read more