Description

A ransomware group calling itself WorldLeaks has allegedly claimed responsibility for a cyberattack targeting global sportswear giant Nike, stating that it plans to publish stolen data on Saturday at 6 p.m. The claim reportedly appeared on the group’s leak site, where it typically lists victims and announces upcoming data disclosures. At the time of writing, there is no public technical report confirming the breach, and Nike has not issued a detailed statement addressing the alleged incident or its potential impact. Although the exact type and volume of data involved remain unclear, WorldLeaks claims it exfiltrated a large amount of internal information. Based on previous incidents linked to similar ransomware groups, security analysts believe such operations often involve data theft on a massive scale, sometimes reaching several terabytes. Attackers commonly gain access through compromised VPN or remote access accounts, exploited vulnerabilities in internet-facing systems, or phishing attacks targeting employees or business partners. Once inside a network, they typically move laterally, collect sensitive files, compress them, and upload the data to external servers before issuing extortion demands. Even without confirmed file encryption, data theft alone can be sufficient to pressure victims. If the claims are accurate, the leaked information could include internal corporate documents, strategic plans, customer or partner data, email addresses, phone numbers, commercial records, and potentially human resources data. Public disclosure of such information could pose serious risks for employees, customers, suppliers, and partners, including targeted phishing campaigns, fraud attempts, and exposure of confidential projects or contracts. Should WorldLeaks follow through with its planned data release, incident responders and threat intelligence teams are expected to analyze the leak to verify its authenticity, determine its scope, and assess the broader risk to individuals and organizations connected to Nike.