Nike Investigates Alleged Data Theft Claim After WorldLeaks Threatens to Publish Stolen Data

Related

Cybersecurity Leaders to Watch in Australian Financial Services

Australia’s financial services sector sits at the epicenter of...

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

What happened Microsoft has developed a lightweight scanner designed to...

EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

What happened Security researchers have detailed a malware campaign in...

Cisco Meeting Management Vulnerability Lets Remote Attackers Upload Arbitrary Files

What happened A high-severity vulnerability in Cisco Meeting Management was...

Share

What happened

Nike probing potential security incident began after the WorldLeaks cybercrime group claimed it stole data from Nike systems and listed the company on a Tor-based leak site on January 22, 2026. The posting included a timer indicating the data would be made public on January 24 unless a ransom was paid, but the group did not specify the amount or type of data allegedly taken. Nike stated it was investigating a potential cybersecurity incident and actively assessing the situation. The report described WorldLeaks as emerging in 2025 following the shutdown of Hunters International, shifting from encryption-based ransomware to data theft and extortion. No independent details about initial access, tooling, or confirmed impact were provided in the report beyond the threat actor’s claim and Nike’s investigation statement.

Who is affected

Nike is directly affected as it investigates potential unauthorized access and any associated exposure. Customers, employees, and partners could be indirectly affected depending on what data types were accessed, if any, and whether extortion activity leads to public disclosure.

Why CISOs should care

Extortion-only operations increase pressure on incident response timelines because disclosure threats can arrive before technical certainty. Even without encryption, data theft can trigger regulatory reporting, contractual exposure, brand damage, and downstream fraud risk if customer or business records are involved.

3 practical actions

  • Accelerate containment and forensic triage: Prioritize validating intrusion scope, access paths, and data staging/exfiltration indicators tied to extortion activity.

  • Harden identity and remote access quickly: Rotate high-risk credentials, review privileged access events, and tighten conditional access where feasible during investigation.

  • Prepare data disclosure decision workflows: Align legal, comms, and security on criteria for notifications and customer guidance if exposed data is confirmed.