Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
Monday, April 6
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Data Breaches

Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen

V DiwaharBy V DiwaharFebruary 20, 2026Updated:March 24, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link
When a brand as globally recognized as Adidas makes headlines for a data breach, the world pays attention. And right now, Adidas is doing exactly what no billion-dollar company wants to do  investigate a potential breach of customer and partner data.On February 16, 2026, a threat actor going by the name “LAPSUS-GROUP” posted on the dark web forum BreachForums, claiming to have infiltrated Adidas’ extranet and extracted 815,000 rows of sensitive data.If that number sounds alarming, that’s because it’s meant to but as we dig deeper, the real story is far more nuanced.
Table of Contents hide
1 How Did This All Start?
2 What Data Was Allegedly Stolen?
3 Was It Really 815,000 Victims?
4 Who Is LAPSUS-GROUP?
5 A Pattern of Third-Party Breaches?
6 Why Extranet Breaches Are High Risk
7 Regulatory Implications
8 What Should You Do Now?
9 Final Thoughts

How Did This All Start?

Like many modern cyberattacks, this incident did not begin with a sophisticated zero-day exploit. Instead, it reportedly originated through a third-party business partner.

Adidas confirmed it is investigating a “potential data protection incident” at one of its independent licensing partners specifically a distributor handling martial arts products under the Adidas brand.

The company clarified that its own internal IT systems, e-commerce platforms, and core consumer databases appear to remain unaffected. However, the alleged breach targeted the Adidas Extranet, a restricted web-based portal used to communicate and share operational data with authorized suppliers, retailers, and business partners.

This extranet functions similarly to a private intranet designed for external collaborators. Unauthorized access to such a system represents a serious security concern, regardless of the scale of extracted data.

What Data Was Allegedly Stolen?

According to the BreachForums post and analysis from independent cybersecurity researchers, the exposed dataset reportedly includes:

  • Full names (first and last)
  • Email addresses
  • Passwords (plaintext or hashed – verification ongoing)
  • Dates of birth
  • Company names
  • Technical data described as extensive backend information
Adidas Breach Claim
Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen

The data was shared as SQL database dump files indicating backend database-level access rather than superficial scraping. Exporting structured database records typically requires deeper system access.

Was It Really 815,000 Victims?

Further investigation significantly challenges the original claim.

Cybersecurity researchers reviewing the SQL files found that much of the 815,000 row count consisted of technical SQL commands (e.g., DROP TABLE entries), not actual user records.

The estimated number of legitimate personally identifiable accounts appears closer to approximately 130 individuals.

Those affected reportedly include customers and employees of Adidas resellers rather than direct Adidas retail customers.

The data has been linked to Double D, a French company founded in 1994 that has held a global Adidas combat sports license since 2005.

While smaller in scale, even 130 compromised accounts containing names, emails, passwords, and birthdates present serious risks including credential stuffing, targeted phishing, and identity fraud.

Adding further uncertainty, LAPSUS-GROUP claimed on Telegram to possess approximately 420GB of additional Adidas-linked data from the French market, warning that “something bigger is coming.” Whether this represents genuine additional exposure or strategic exaggeration remains unclear.

Who Is LAPSUS-GROUP?

The name closely resembles the notorious Lapsus$ collective. Security researchers suspect connections to the Scattered Lapsus$ Hunters network.

Unlike traditional ransomware groups, Lapsus$-associated actors are known for:

  • Social engineering attacks
  • SIM swapping
  • Credential phishing
  • Impersonation of employees

According to threat intelligence reporting from Resecurity, groups including Lapsus$, Scattered Spider, and ShinyHunters rank among the most active English-speaking cybercriminal organizations today.

Their strategy often involves targeting high-profile brands, amplifying claims publicly, and leveraging media exposure for recruitment and intimidation.

A Pattern of Third-Party Breaches?

This incident is not isolated.

In May 2025, Adidas disclosed another data breach linked to a third-party customer service provider. That breach exposed names, emails, phone numbers, and physical addresses of customers who had previously contacted support.

Although passwords and payment information were reportedly unaffected in that case, two third-party-related breaches within a year highlight growing supply chain security risks.

When vendors, licensees, and service providers operate with weaker cybersecurity controls, enterprise organizations inherit that risk exposure.

Why Extranet Breaches Are High Risk

Consumers often assume that if a company’s primary website or mobile app remains secure, their data is safe. Extranet breaches challenge that assumption.

  • Privileged access: Extranets often integrate with internal workflows and supply chain systems.
  • Lateral movement risk: Partner credentials can provide pivot points deeper into networks.
  • Credential stuffing: Weak or reused passwords can be exploited across multiple platforms.
  • Spear phishing: Combined personal and corporate data enables highly targeted attacks.
  • Reputational damage: Trust erosion impacts both consumers and enterprise partners.

Regulatory Implications

Regulation Region Notification Deadline
GDPR European Union 72 hours after discovery
CCPA California, USA Without unreasonable delay
DPDP Act India As per CERT-In guidelines

If confirmed, the breach involving Double D  a French entity triggers GDPR obligations. Under GDPR, supervisory authorities must be notified within 72 hours of confirmed awareness.

Non-compliance may result in penalties of up to €10 million or 2% of global annual turnover, whichever is higher.

What Should You Do Now?

  • Change your Adidas password immediately and make it unique.
  • Enable Multi-Factor Authentication (MFA) on critical accounts.
  • Remain alert for phishing emails requesting account verification.
  • Monitor accounts for suspicious login attempts or unauthorized transactions.
  • Use HaveIBeenPwned to check breach exposure.
  • Avoid clicking unsolicited email links, even from familiar brands.

Final Thoughts

The February 2026 Adidas alleged data breach reinforces a fundamental cybersecurity principle: an organization’s security posture is only as strong as its weakest third-party connection.

Even if LAPSUS-GROUP exaggerated the scope, the incident underscores the importance of supply chain security governance, vendor auditing, and extranet access hardening.

For individuals, the lesson remains unchanged practice strong password hygiene, reduce unnecessary digital exposure, and remain vigilant.

Quick Tip: Regularly review and delete unused online accounts to minimize breach exposure.

Stay ahead of the latest data breaches, ransomware incidents, and cybersecurity developments by following cyberinfos.in. Subscribe to our weekly threat roundup for timely updates.

Related posts:

  1. FortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)
  2. 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
  3. Claude Distillation Attacks: 16M API Exchanges Exposed
  4. FBI Wiretap Breach 2026: Surveillance Database Hacked
Data Breach 2026
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticlePromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks
Next Article PayPal Data Breach: 6-Month SSN Exposure Shocks Small Businesses
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Data Breach Detection Time 2026: The Full Guide

March 28, 2026
Read More

FBI Wiretap Breach 2026: Surveillance Database Hacked

March 10, 2026
Read More

Cognizant TriZetto Breach Exposes Data of 3.4M Patients

March 8, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.