Jan 26
/
Latest News
WorldLeaks Targets Nike in Massive 1.4TB Data Breach Claim
In a major escalation of cyber activity within the athletic apparel industry, the ransomware collective WorldLeaks has announced a massive breach of Nike, Inc., allegedly exfiltrating 1.4 terabytes of sensitive internal data. This claim comes as the public is still reeling from the recent Under Armour breach, marking a turbulent start to 2026 for global retail giants.
The claims surfaced on Thursday, January 22, 2026, when WorldLeaks—the recently rebranded entity formerly known as Hunters International—posted Nike’s name to its dark web leak site. By the following weekend, the group escalated the situation by publishing supporting evidence, asserting they had successfully stolen 188,347 files. This group is no stranger to high-profile targets; they were the architects of the July 2025 Dell data breach, where they successfully leaked 1.3TB of corporate information.
A preliminary analysis of the leaked file structures suggests that the breach has compromised the very "secret sauce" of Nike’s operations. The data appears to be heavily concentrated on product development and manufacturing logistics. Folder names and file directories reveal a treasure trove of proprietary information, including tech packs, graded nests, wash tests, and detailed schematics. These documents likely represent the blueprint of Nike’s design process, potentially exposing future collections and unreleased product concepts long before they hit the retail market.
Beyond design specifications, the leak appears to pull back the curtain on Nike’s global supply chain. The presence of Bill of Materials (BOM) files, trim calculators, and factory inspection reports suggests that the attackers have gained access to the intricate operational workflows shared between Nike and its external manufacturing partners. The data also spans specific high-profile categories, with file names referencing Jordan Brand, women’s performance wear, and specialized gear for tennis and golf. Strategic materials involving athlete collaborations and federation-related apparel were also identified, providing a rare and unauthorized look into the company's long-term roadmaps and innovation decks.
While the initial assessment does not indicate that customer payment information has been compromised, the sheer volume of intellectual property and operational data poses a significant competitive risk. In response to the claims, Nike issued a swift statement confirming they are aware of the situation and are currently in the process of validating the breach. A company spokesperson emphasized that Nike takes data security and consumer privacy seriously and is "actively assessing the situation" to determine the full scope of the incident.
The claims surfaced on Thursday, January 22, 2026, when WorldLeaks—the recently rebranded entity formerly known as Hunters International—posted Nike’s name to its dark web leak site. By the following weekend, the group escalated the situation by publishing supporting evidence, asserting they had successfully stolen 188,347 files. This group is no stranger to high-profile targets; they were the architects of the July 2025 Dell data breach, where they successfully leaked 1.3TB of corporate information.
A preliminary analysis of the leaked file structures suggests that the breach has compromised the very "secret sauce" of Nike’s operations. The data appears to be heavily concentrated on product development and manufacturing logistics. Folder names and file directories reveal a treasure trove of proprietary information, including tech packs, graded nests, wash tests, and detailed schematics. These documents likely represent the blueprint of Nike’s design process, potentially exposing future collections and unreleased product concepts long before they hit the retail market.
Beyond design specifications, the leak appears to pull back the curtain on Nike’s global supply chain. The presence of Bill of Materials (BOM) files, trim calculators, and factory inspection reports suggests that the attackers have gained access to the intricate operational workflows shared between Nike and its external manufacturing partners. The data also spans specific high-profile categories, with file names referencing Jordan Brand, women’s performance wear, and specialized gear for tennis and golf. Strategic materials involving athlete collaborations and federation-related apparel were also identified, providing a rare and unauthorized look into the company's long-term roadmaps and innovation decks.
While the initial assessment does not indicate that customer payment information has been compromised, the sheer volume of intellectual property and operational data poses a significant competitive risk. In response to the claims, Nike issued a swift statement confirming they are aware of the situation and are currently in the process of validating the breach. A company spokesperson emphasized that Nike takes data security and consumer privacy seriously and is "actively assessing the situation" to determine the full scope of the incident.
Executive IT Forums, Inc.
Educational Programs on Information Technology, Governance, Risk Management, & Compliance (GRC).
Our Newsletter
Get regular updates on CPE programs, news, and more.
Thank you!
Copyright © 2026 Executive IT Forums, Inc. All Rights Reserved.
Get started
Let us introduce our school
Write your awesome label here.