Connect with us

Security

Nike’s Cybersecurity Crisis: Uncovering the Data Breach and Extortion Scheme

Published

on

Nike Investigating Potential Cyber Security Incident After Data Leak

Nike is currently looking into what it has described as a “potential cyber security incident” following the release of 1.4 TB of files by the World Leaks ransomware gang. The sportswear giant is taking consumer privacy and data security seriously and is actively assessing the situation.

The extortion group, World Leaks, recently announced that they had acquired nearly 190,000 files containing corporate data related to Nike’s business operations. This information was added to their dark web data-leak site.

Wiz

Prior to the publication of this article, World Leaks removed the Nike entry from its leak. This action suggests that negotiations may be ongoing between the company and the extortion group, or that Nike has already paid a ransom to have the allegedly stolen documents removed.

Despite these claims by the extortion gang, Nike has not confirmed the data theft. Additionally, BleepingComputer has not been able to independently verify whether the leaked files actually contain legitimate data.

Nike entry on World Leaks' leak website
Nike’s entry on World Leaks’ leak website (BleepingComputer)

World Leaks is believed to be a rebrand of the Hunters International ransomware group, which transitioned from file encryption to data theft and extortion-only attacks in January 2025. This shift was driven by concerns that traditional ransomware operations were no longer as profitable.

Hunters International, initially identified in late 2023, was suspected of being a possible Hive ransomware rebrand due to code similarities. The group claimed responsibility for over 280 attacks, targeting organizations such as the U.S. Marshals Service, Tata Technologies, Hoya, AutoCanada, and Austal USA.

See also  Securing Britain's Digital Future: A Comprehensive Action Plan for Cybersecurity in Public Services

World Leaks has since exposed data stolen from numerous organizations worldwide on its data leak site. In July, affiliates of the group were linked to breaches on Dell’s product demonstration platforms and the exploitation of end-of-life SonicWall SMA 100 devices to deploy custom OVERSTEP rootkit malware.

Wiz

Discover how to securely manage old keys and set AI-generated code guardrails with this comprehensive guide. Eliminate guesswork and enhance your team’s security practices.

Download the cheat sheet now for seamless secrets management.

Trending