Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Nike Allegedly Hacked by WorldLeaks Ransomware Group
CyberSecurity News

Nike Allegedly Hacked by WorldLeaks Ransomware Group

Athletic footwear and apparel manufacturer Nike has become the latest victim of WorldLeaks, a ransomware group specializing in financially motivated data extortion. The group announced the breach on...

Marcus Rodriguez
Marcus Rodriguez
January 23, 2026 2 Min Read
0 0

Athletic footwear and apparel manufacturer Nike has become the latest victim of WorldLeaks, a ransomware group specializing in financially motivated data extortion.

The group announced the breach on its darknet leak site on January 22, claiming responsibility for the incident and threatening to release stolen data on January 25, 2026, at 6 PM GMT.

WorldLeaks listed Nike as a victim on its leak platform with minimal accompanying details. However, the post reportedly received over 400 views within hours of publication.

According to a post on forums, the attack was discovered on January 22, 2026, with data exfiltration occurring on the same date.

Nike confirmed its awareness of the alleged incident in an official statement: “We are investigating a potential cybersecurity incident and are actively assessing the situation.”

World Leaks Claim

The exact volume of exfiltrated data remains unconfirmed. However, industry analysts suggest it could potentially reach several terabytes based on WikiLeaks‘ historical attack patterns.

Nike reported approximately 481,183 compromised users, 220 compromised employees, and 444 third-party employee credentials exposed in the incident.

Available evidence suggests that multiple data categories may have been compromised during the attack.

Including internal company documentation, customer information, employee email addresses and phone numbers, business operational records, and human resources data.

The specific nature and scope of sensitive information exposed, including potential intellectual property, product development details, or financial records, remain undisclosed pending Nike’s ongoing investigation.

WorldLeaks Profile

WorldLeaks emerged as a strategic rebrand of Hunters International in January 2025, following the predecessor group’s cessation of operations.

The group operates using an extortion-only model, focusing exclusively on data theft rather than file encryption, enabling faster attack execution and reduced detection risk.

The group maintains a sophisticated four-platform infrastructure: a public leak site for victim showcase, a negotiation portal for ransom communications.

An “Insider” journalist platform providing 24-hour advance data access and an affiliate management system.

WorldLeaks has claimed over 116 victims since its formation, including high-profile targets such as Dell Technologies (1.3TB stolen) and L3Harris Technologies, a US defense contractor.

Intelligence reports indicate WikiLeaks typically gains initial access through compromised legitimate websites, phishing campaigns with malicious attachments, unpatched internet-exposed applications, or VPNs lacking multi-factor authentication.

Post-compromise, the group leverages credential theft, lateral movement through network shares, and custom-developed exfiltration tooling to catalog and extract sensitive data.

This incident marks the continuation of coordinated cyberattacks targeting the retail and athletic apparel sectors in recent months.

Security researchers note the pattern suggests deliberate targeting of high-value organizations with weak authentication infrastructure and significant intellectual property holdings.

Organizations should implement mandatory multi-factor authentication on all remote access points and conduct immediate network segmentation reviews.

Establish enhanced monitoring for unauthorized data exfiltration to external cloud services and anonymized networks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityPatchphishingransomwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

New Windows 11 KB5074109 Update Breaks Systems – Microsoft Asks

Next Post

North Korea Used AI Malware to Attack Devs & Engineering

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us