Criticality: 7/10

WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data

Source: Dark Reading
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data - Nike breach, WorldLeaks, cybersecurity incident

The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.

Details of the Incident

Nike has confirmed that it was targeted by a cybercrime group called WorldLeaks. The incident resulted in the exposure of approximately 188,347 sensitive files, raising concerns about the security of its systems and operations.

Data Compromised

  • Personal data of employees and contractors
  • Financial records
  • Intellectual property documents
  • Customer information

Impact and Response

Nike is currently assessing the extent of the damage and working closely with cybersecurity experts to mitigate potential risks. The company has stated that it will cooperate fully with law enforcement agencies in their investigation.

Criticality Score: 7/10

The incident could have significant financial and reputational impacts on Nike, potentially leading to increased operational costs, loss of customer trust, and regulatory scrutiny. The exposure of sensitive data also poses a risk to employee privacy and security.

Threat Type: Cyber Extortion

The WorldLeaks group is known for its use of cyber extortion tactics. By threatening to release the stolen data unless a ransom is paid, they are attempting to extort money from Nike. The company has stated that it will not pay the ransom and will instead focus on addressing the underlying security vulnerabilities.

Conclusion

The incident highlights the ongoing threat of cybercrime and the importance of robust cybersecurity measures for companies in all industries. Nike should continue to prioritize its security posture and seek expert assistance to prevent future breaches.

Keywords

Nike breach WorldLeaks cybersecurity incident data theft extortion

Threat Type

Cyber Extortion

Original Source

For more information, check the original article:

View Source Article