Accelerated by:


Copyright © 2025 Apollo Cybersecurity

Over the past few days, Nike You have confirmed that you are investigating a possible cybersecurity incident following the allegations of a group of cybercriminals who claim to have obtained internal information from the company. Although a security breach or the exposure of personal data has not been confirmed, the case once again focuses on the risks associated with enterprise IT security and to attacks based on extortion through information theft.
This article analyzes What is known so far, what risks does this type of attack entail and why situations like this should be taken into account by any organization, regardless of its sector.
According to information recently published by various media and confirmed by the company itself, Nike is actively evaluating a potential security incident following a claim made on a dark web leak portal.
The points confirmed so far They are:
It is important to stress that, as of today, the existence of a security breach has not been officially confirmed nor the actual extent of the alleged unauthorized access.
The group that is claiming responsibility for the incident, World Leaks, is known for operating under a model of extortion through data exfiltration, a variant of the computer attack that does not necessarily involve the encryption of systems, as is the case in traditional ransomware.
These types of attacks usually follow a common pattern:
In this specific case, the group claims to have obtained documentation related to internal operations, such as design processes, manufacturing or training materials. However, these statements have not been verified by independent third parties.
Global companies such as Nike are especially attractive for these types of attacks for several reasons:
These types of situations reinforce a well-known reality in cybersecurity: the risk is not limited to service interruption, but also to the possible exposure of critical internal information for the business.
Although each incident is different, attacks based on data exfiltration are often caused by a combination of common factors:
In many cases, initial access goes unnoticed for weeks or months, until the attacker decides to make his claim public.
Regardless of how the research evolves, this case leaves clear lessons for organizations of all sizes:
Cases like Nike show that cybersecurity is no longer just a technical issue. It is a strategic decision that affects continuity, reputation and trust in the organization.
Even when an incident is not confirmed, the ability to investigate, communicate with transparency and reinforce controls makes the difference between responsible risk management and a poorly contained crisis.
In Apolo Cybersecurity we help organizations to anticipate, detect and respond face this type of threat through services such as security audits, vulnerability analysis, 24/7 SOC and strategic support in incident management.
If you want to assess your company's actual level of exposure and reinforce your security posture before an incident occurs, we can help you.
