• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Nike Information Breach Claims Floor as WorldLeaks Leaks 1.4TB of Information On-line – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

Admin by Admin
January 26, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


As customers proceed to evaluate the Below Armour information breach, WorldLeaks, the rebranded model of the Hunters Worldwide ransomware group, is claiming to have breached Nike, Inc., a serious U.S.-based athletic footwear and attire firm.

The claims had been printed on the group’s official darkish internet leak website on Thursday, January 22, 2026. Over the weekend, WorldLeaks up to date the submit with what it says is supporting proof, alleging that the attackers exfiltrated greater than 1.4 terabytes of Nike information with 188,347 recordsdata that are actually being leaked on-line.

It’s value noting that the identical group was behind the Dell information breach in July 2025, during which it stole 1.3tb of information and later leaked it on-line.

Nike Data Breach Claims Surface as WorldLeaks Leaks 1.4TB of Files Online
Screenshot from the WorldLeaks ransomware group’s darkish internet leak website (Credit score: Hackread.com)

The Leaked Information

A fast evaluation of the folder names and recordsdata suggests the leaked information is closely centered on product improvement, manufacturing, and manufacturing unit operations. Many directories reference tech packs, schematics, BOMs, graded nests, coaching supplies, wash checks, trim calculators, and dimension units. This factors to detailed design specs for attire and sportswear throughout a number of seasons, together with future collections.

There are additionally repeated references to manufacturing unit companions, onsite coaching, inspections, dashboards, and inside workflows, which possible include operational paperwork shared between Nike groups and exterior producers. In sensible phrases, this might expose how merchandise are designed, examined, costed, and produced earlier than they ever attain shops.

The recordsdata additionally seem to incorporate inside shows, technique paperwork, art work, movies, and collaboration supplies tied to particular product strains, athletes, groups, and areas. File names reference Jordan, girls’s efficiency put on, coaching gear, tennis, golf, and federation or league-related attire, alongside art work recordsdata, embroidery designs, print layouts, and innovation decks.

There are additionally recordings, PDFs, and spreadsheets that recommend inside conferences, planning classes, and long-term improvement roadmaps. Whereas there isn’t any apparent signal of buyer cost information on this snapshot, the amount and nature of the fabric point out a deep look into Nike’s inside processes, provider relationships, and unreleased product ideas, data that will usually by no means be public.

Nike’s Response

Nike responded rapidly, stating that it’s investigating claims surfaced by WorldLeaks. “We all the time take client privateness and information safety very critically. We’re investigating a possible cybersecurity incident and are actively assessing the scenario,” the corporate stated.

Hackread.com is monitoring the scenario, and this text will likely be up to date as extra data turns into accessible.



Tags: 1.4TBBreachBreachesClaimscybersecurityDataFilesHackreadleaksNewsNikeonlineSurfaceWorldLeaks
Admin

Admin

Next Post
After 5 Years, Apple Lastly Upgrades the AirTag

After 5 Years, Apple Lastly Upgrades the AirTag

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

The Full Information to Vector Databases for Machine Studying

The Full Information to Vector Databases for Machine Studying

October 24, 2025
Preserving Article Demos Alive When Third-Occasion APIs Die

Preserving Article Demos Alive When Third-Occasion APIs Die

July 31, 2025

Trending.

The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

March 26, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
The most effective methods to take notes for Blue Prince, from Blue Prince followers

The most effective methods to take notes for Blue Prince, from Blue Prince followers

April 20, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

5 Helpful Amazon Options You are Not Utilizing (However Completely Ought to)

5 Helpful Amazon Options You are Not Utilizing (However Completely Ought to)

January 27, 2026
Yumchat AI Chatbot Evaluate: Key Options & Pricing

Yumchat AI Chatbot Evaluate: Key Options & Pricing

January 27, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved