Extortion group WorldLeaks published 1.4 terabytes of Nike internal data on January 24, 2026, after the sportswear giant didn’t respond to ransom demands. Unlike typical breaches focused on customer databases, this leak centers on intellectual property—product designs, manufacturing processes, and supply chain details that could enable counterfeiting and competitive intelligence gathering.

Incident overview

AttributeDetails
VictimNike, Inc.
Threat actorWorldLeaks
Data volume1.4 TB
Files leaked188,347
Data timespan2020-2026
Customer PIINone observed (no names, addresses, payment data)
Employee PIINone observed
Social Security numbersNone observed

Timeline

DateEvent
January 22, 2026WorldLeaks lists Nike on darknet site with 7-day deadline
January 24, 2026Deadline passes; WorldLeaks publishes full 1.4TB dataset
January 26, 2026Nike confirms investigation
Shortly afterWorldLeaks removes Nike listing from site

The removal of Nike’s listing shortly after publication typically indicates either active negotiations or ransom payment—though Nike has not confirmed either scenario.

What was published

The leaked archive contains 188,347 files spanning 2020 through 2026:

Product development data

CategoryContents
Design schematicsUpcoming products including Jordan Brand SP27 collection
Technical packsDetailed manufacturing specifications
Bills of materials (BoMs)Component suppliers and costs
PrototypesDesign files and iterations

Manufacturing operations

CategoryContents
Factory auditsCompliance reports
Partner informationManufacturing relationships
Process documentationGarment making procedures
Training resourcesFactory training materials

Directory structure

Directory nameContent type
”Women’s Sportswear”Product development
”Men’s Sportswear”Product development
”Training Resource - Factory”Manufacturing documentation
”Garment Making Process”Production procedures

Cybernews researchers reviewed samples and assessed the files as legitimate. No customer or employee PII was observed in the leak.

Business impact assessment

Counterfeiting risk

ImpactAssessment
Technical pack exposureCounterfeiters can produce fakes without reverse engineering
BoM availabilityExact components and suppliers known
Pre-release designsCounterfeits may hit market before authentic products
Quality matchingManufacturing specs enable higher-quality fakes

Competitive intelligence

ImpactAssessment
Design pipeline visibilityCompetitors see 6 years of product development
Material sourcingSupply chain relationships exposed
Cost structuresBoMs reveal manufacturing economics
R&D directionStrategic product focus visible

Supply chain exposure

ImpactAssessment
Factory auditsSupplier security posture revealed
Partner informationThird-party targeting enabled
Compliance reportsVulnerability information available

Product launch disruption

ImpactAssessment
Design compromiseLeaked products may need redesign
Launch timingDelays possible for compromised lines
Brand damageConsumer trust implications

Nike’s response

“We always take consumer privacy and data security very seriously. We are investigating a potential cyber security incident and are actively assessing the situation.” — Nike spokesperson

As of publication, Nike has not:

  • Confirmed whether the leaked data is authentic
  • Disclosed how the breach occurred
  • Confirmed or denied ransom negotiations

About WorldLeaks

WorldLeaks launched January 1, 2025, as a rebrand of Hunters International, a ransomware gang active from late 2023 to mid-2025.

Evolution from Hunters International

AttributeHunters InternationalWorldLeaks
Active periodLate 2023 - Mid 2025January 2025 - Present
TacticsRansomware + extortionData theft + extortion only
EncryptionFile encryption deployedNo ransomware
LeverageDecrypt key + leak threatLeak threat only

WorldLeaks characteristics

AttributeDetails
ModelPure data theft and extortion
RansomwareNone deployed
Typical deadline7 days
Claimed victims116+ since January 2025
Notable targetsDell, UBS, Nike

Why abandon ransomware?

FactorBenefit
StealthExfiltration can go undetected longer
SimplicityNo encryption infrastructure needed
ReliabilityNo risk of faulty decryptors
PressureLeak threats still generate payments
Detection avoidanceIT doesn’t notice until data appears online

The shift away from ransomware reflects a broader trend: encryption creates noise (IT notices immediately when systems go down) while pure exfiltration can go undetected for longer and still generates payment pressure through leak threats.

Industry implications

IP-focused breach trend

Traditional targetEmerging target
Customer databasesProduct designs
Payment card dataManufacturing specs
Employee PIISupply chain details
Financial recordsR&D documentation

The Nike breach demonstrates that customer databases aren’t the only valuable target. Product development pipelines contain IP worth potentially more than PII to certain threat actors.

Retail/apparel sector risk

Valuable dataRisk level
Upcoming product designsCritical
Manufacturing partnershipsHigh
Supplier pricingHigh
Quality control processesMedium

Recommendations

For Nike customers

This breach doesn’t appear to include customer data. However:

RiskMitigation
PhishingWatch for scams referencing Nike products or purchases
Counterfeit productsBe cautious of unusually cheap “authentic” items

For organizations

PriorityAction
HighSegment intellectual property systems from general corporate networks
HighMonitor for unusual data exfiltration patterns
HighImplement DLP controls on sensitive design/manufacturing documentation
HighAudit third-party access to product development systems
MediumReview data classification for IP vs. PII

For retail/apparel industry

PriorityAction
HighRecognize R&D systems as high-value targets
HighImplement monitoring on design file repositories
HighReview supply chain partner access controls
OngoingUpdate threat models beyond PII-focused scenarios

Detection indicators

Organizations should monitor for:

IndicatorConcern
Large outbound data transfersPossible exfiltration
Access to archived design filesUnusual access patterns
After-hours file accessNon-business activity
Bulk file downloadsData staging

Context

The Nike breach exemplifies the evolution of extortion group tactics. By targeting intellectual property rather than customer data:

  • No breach notifications required (no PII exposed)
  • Longer useful lifespan for stolen data (designs remain valuable)
  • Direct business impact (counterfeiting, competitive loss)
  • Harder to quantify for legal/insurance purposes

Security programs focused primarily on protecting customer PII may miss significant IP exposure risks. Organizations with valuable intellectual property should ensure their security posture accounts for this expanded threat model.

Parallel incident: Under Armour

Nike is the second major sportswear brand breached in recent months:

BrandThreat actorDateData type
Under ArmourEverest ransomwareNovember 2025Undisclosed
NikeWorldLeaksJanuary 2026Intellectual property

The targeting of multiple sportswear brands suggests attackers may be systematically pursuing this sector.

R&D investment context

The Nike breach highlights the value of research and development data:

FactorImpact
R&D spendingNike invests billions annually in product development
Competitive advantageDesign IP represents years of innovation
Market timingPre-release designs enable counterfeit head starts
Supply chain intelligenceManufacturing relationships are trade secrets

Companies like Nike pour billions into R&D, and data leaks of this sort can severely hinder the competitive advantage those investments provide.

Notification requirements

Because no customer PII appears to be included in the leak:

RequirementStatus
State breach notificationLikely not triggered
GDPR notificationMay not apply (no EU personal data)
SEC disclosureUnder review (material impact assessment)
Customer notificationNot required

This represents a gap in breach notification frameworks—significant intellectual property theft may not trigger the same disclosure requirements as PII breaches.