The sports multinational Nike has reported that she is investigating what she calls a " possible cybersecurity incident"after the extortion group known as World Leaks published on the dark web a data dump of 1.4 TB which, according to the attackers, would come from the company. The news jumped to the specialized press when the collective included Nike on its leaks site and claimed to have obtained about 190,000 files related to internal business operations.
Nike herself sent a statement to the media that consumer privacy and data security are priorities and that the company is actively assessing the situation. This confirmation, however, is not the same as a validation of the authenticity of published material: means such as BleepingComputer They noted that, until their publication, they had been unable to independently verify whether the filtered files contained legitimate information.

A striking detail of the case is that, before the news coverage was spread, World Leaks removed the entry over Nike from his own leaks. This gesture is usually interpreted in two ways: either that a bargaining channel has been opened between the victim and the extortors, or that the company would have agreed to pay for the data to be withdrawn. In any case, both assumptions are speculative until there is official confirmation.
World Leaks is not an isolated actor in the current picture. The group is largely considered a reincarnation of Hunters International, a set that in January 2025 abandoned the mass encryption of files to focus exclusively on information theft and extortion, an evolution motivated by the calculation of risks and profitability of criminal gangs. Research in specialized media has linked these groups to previous campaigns and code similarities that point to connections to operations like Hive, which shows how Ransomware families and filtration groups often mutate and reorganize over time. For more comprehensive follow-up on this dynamic and recent cases, e-security and specialized press sources, such as KrebsOnSecurity and BleepingComputer.
The attacks attributed to these groups have affected very different entities: from government services to large corporations and industry. The incidents that have been related to the same families of attackers include organizations such as the U.S. Marshal Service, large technology companies and service providers, as well as supply providers and defence contractors. Intrusions involving product demonstration platforms and off-support devices to install specific malware have also been reported, according to the technical reports available in the sector press.
What does all this mean for users and for companies? First, it is important to separate the rumorology from the evidence. The mere presence of a name in a filtering site does not, on its own, prove that there has been exposure of personal data. However, when the theft of hundreds of thousands of files and terabytes of information is alleged, the possibility of sensitive material - both corporate and of employees or customers - being exposed is real. Therefore, until Nike makes a detailed disclosure, it is appropriate to follow the evolution of the incident through official channels.
For organizations, this episode reaffirms an idea already repeated by experts and agencies such as the CISA or FBI:: The defence against threats of digital extortion requires both technical controls (patches, network segmentation, identity protection and access management) and organizational preparations (incident response plans, isolated backup and coordination with security forces). In addition, the re-use of code among criminal groups and their tendency to override requires that the intelligence about threats be kept up to date and that the community work together to detect early patterns.
Users, for their part, must monitor suspicious communications, be attentive to formal company notices and, if personal data are suspected to have been exposed, follow basic protection practices: review accounts, change credentials if appropriate and activate double-factor measures in services that allow. In the case of customers of large brands, official information on the extent of the incident and recommendations is usually published through press releases or support portals; to know Nike's public position it is appropriate to review his press centre at news.nike.com and the updates of specialized media.

This event also calls for reflection on the economy of technological crime: many groups have chosen to prioritize the theft and selective publication of data rather than encryption systems, because they reduce operational risks and increase extortion levers. The response and mitigation community is watching it carefully, as it involves new means of damage and forces organizations to protect not only the operational continuity but also the confidentiality of their assets.
As the investigation continues and the pieces of the puzle are clarified, it is recommended to keep an eye on official releases and reports from cybersecurity entities. In order to be informed about good practices and preventive measures, in addition to following technical press coverage, it is appropriate to consult guides and alerts from agencies such as CISA, FBI or Europol which update recommendations and guidelines for companies of all sizes.
In short, the publication attributed to World Leaks has put Nike and, again, a threat that is not limited to blocking systems: it seeks to profit from information exposure. Until there are forensic audits and public confirmations, the news must be handled with caution: forensic investigation and information transparency will be key to measure the actual scope and mitigate future damage.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...