Nike investigates data breach after extortion gang leaks files

BleepingComputer
Actively Exploited

Overview

Nike is currently looking into a potential data breach after the World Leaks ransomware group leaked 1.4 terabytes of files that they claim to have stolen from the company. This incident raises concerns about the security of sensitive information held by one of the largest sportswear brands in the world. The leaked files could potentially contain customer data, company secrets, or other critical information, which might lead to further extortion attempts or data misuse. Nike's investigation is crucial not only for the company's reputation but also for the safety of its customers and business partners. As the situation unfolds, it highlights the ongoing threat posed by ransomware gangs targeting major corporations.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Nike's customer data, internal documents, proprietary designs, and other sensitive information.
  • Action Required: Nike is investigating the breach and has not specified any immediate remediation steps.
  • Timeline: Ongoing since October 2023

Original Article Summary

Nike is investigating what it described as a "potential cyber security incident" after the World Leaks ransomware gang leaked 1.4 TB of files allegedly stolen from the sportswear giant. [...]

Impact

Nike's customer data, internal documents, proprietary designs, and other sensitive information.

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since October 2023

Remediation

Nike is investigating the breach and has not specified any immediate remediation steps.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Ransomware, Data Breach, Critical.

Related Coverage

I took apart the new AirTag 2 and found a serious flaw in Apple's popular tracker

Latest news

In a recent examination of the new AirTag 2, a notable security vulnerability was discovered. An individual was able to disable the device's speaker in just two minutes using a single tool. This is significant because the speaker is essential for alerting users to the AirTag's location, which could lead to unauthorized tracking or tampering. If an attacker can easily silence the AirTag, it undermines its primary function of helping users locate lost items. This flaw raises concerns for anyone who relies on the AirTag for tracking personal belongings, as it may create opportunities for misuse. Apple's tracking devices are popular among consumers, and this discovery could lead to increased scrutiny of their security features.

Feb 5, 2026

Cairncross: Industry crucial in shaping US cybersecurity strategy

SCM feed for Latest

The U.S. government is seeking greater collaboration with the private sector to improve its cybersecurity measures. National Cyber Director Sean Cairncross emphasized the need for businesses to assist in developing stronger cybersecurity regulations and enhancing information-sharing practices. This initiative is part of a broader national strategy aimed at addressing the increasing cyber threats facing the nation. By working together, the government and industry can create a more secure digital environment for all Americans. This partnership is crucial as cyberattacks become more sophisticated and frequent, affecting various sectors.

Feb 5, 2026

Expert says CISA silently fixing bugs could be a problem

SCM feed for Latest

The Cybersecurity and Infrastructure Security Agency (CISA) has been updating software vulnerabilities related to ransomware without notifying cybersecurity defenders, as pointed out by Glenn Thorpe of GreyNoise. This lack of transparency could lead to missed ransomware intrusions, as defenders may not be aware of the vulnerabilities that have been patched. The updates affected numerous software vulnerabilities last year, raising concerns about the potential risks for organizations relying on these systems. The situation emphasizes the need for better communication between CISA and cybersecurity professionals to ensure that all parties are informed about critical updates that could impact security posture.

Feb 5, 2026

Misconfiguration exposes billions of Chinese records

SCM feed for Latest

A significant data breach has occurred due to an unsecured Elasticsearch cluster, exposing over 8.7 billion records related to Chinese citizens. This incident is one of the largest data spills linked to the open-source search and analytics tool. The exposed data includes sensitive information, raising serious concerns regarding privacy and security for those affected. Researchers are warning that such massive leaks could lead to identity theft and other malicious activities. It's crucial for organizations using Elasticsearch to ensure their configurations are secure to prevent similar incidents in the future.

Feb 5, 2026

Hackers compromise NGINX servers to redirect user traffic

BleepingComputer

Hackers are targeting NGINX servers in a campaign that reroutes user traffic through their own infrastructure. This attack compromises the servers, allowing the perpetrators to intercept and manipulate the data being transmitted. Affected users may experience altered content or be redirected to malicious sites without their knowledge. The incident raises concerns about the security of NGINX, a widely used web server software, and the potential for significant data breaches. Organizations using NGINX should take immediate precautions to safeguard their systems and ensure that their configurations are secure to prevent such hijacking.

Feb 4, 2026

Critical n8n flaws disclosed along with public exploits

BleepingComputer

Researchers have identified multiple serious vulnerabilities in n8n, a widely used open-source workflow automation platform. These flaws could enable attackers to escape the security measures of the software, potentially giving them complete control over the host server. This poses a significant risk to users, especially those running n8n in production environments. If exploited, these vulnerabilities could lead to unauthorized access and data breaches, impacting businesses that rely on n8n for automation tasks. Users are strongly advised to assess their systems and implement necessary security measures as soon as possible.

Feb 4, 2026